header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Webmin 1.996 – Remote Code Execution (RCE) (Authenticated)

A vulnerability in Webmin 1.996 allows an authenticated user to execute arbitrary code on the server. This is due to the lack of input validation in the update.cgi script, which allows an attacker to inject malicious code into the 'u' parameter. This code is then executed by the server when the update is installed.

NanoCMS v0.4 – Remote Code Execution (RCE) (Authenticated)

This script uploads a php reverse shell to the target. NanoCMS does not sanitise the data of an authenticated user while creating webpages. Pages are saved with .php extensions by default, allowing an authenticated attacker access to the underlying system.

mPDF 7.0 – Local File Inclusion

mPDF is vulnerable to Local File Inclusion (LFI) vulnerability. An attacker can exploit this vulnerability to read sensitive files from the server. The attacker can craft a malicious payload and send it to the vulnerable server. The payload contains the file name which the attacker wants to read from the server. The attacker can also use the base64 encoded payload to bypass the security filters. The attacker can also use the URL encoded payload to bypass the security filters.

Wavlink WN533A8 – Cross-Site Scripting (XSS)

A Cross-Site Scripting (XSS) vulnerability exists in Wavlink WN533A8, which allows an attacker to inject malicious JavaScript code into the application. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability is due to insufficient validation of user-supplied input in the 'login_page' parameter of the 'login.cgi' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.

Recent Exploits: