header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin WP-UserOnline 2.87.6 – Stored Cross-Site Scripting (XSS)

A stored XSS vulnerability exists in WordPress Plugin WP-UserOnline version 2.87.6 and below. An attacker can exploit this vulnerability by entering malicious JavaScript payload into the User(s) Browsing Site field in the plugin settings. When the payload is triggered, the JavaScript code is executed, allowing the attacker to gain access to the user's session.

Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) – Remote Code Execution

A vulnerability in Schneider Electric SpaceLogic C-Bus Home Controller (5200WHC2) allows an unauthenticated attacker to execute arbitrary code on the device. The vulnerability exists due to improper validation of user-supplied input in the web interface. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the web interface. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the device.

Carel pCOWeb HVAC BACnet Gateway 2.1.0 – Directory Traversal

The device suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.

Asus GameSDK v1.0.0.4 – ‘GameSDK.exe’ Unquoted Service Path

If an attacker had already compromised the system and the current user has the privileges to write in the 'C:Program Files (x86)ASUS' folder or in 'C:', he could place his own 'Program.exe' or 'GameSDK.exe' files respectively, and when the service starts, it would launch the malicious file, rather than the original 'GameSDK.exe'.

rpc.py 0.6.0 – Remote Code Execution (RCE)

A 0-day unauthenticated Remote Code Execution (RCE) vulnerability was discovered in rpc.py versions v0.4.2 - v0.6.0. An attacker can exploit this vulnerability by sending a malicious serialized payload to the vulnerable server using the pickle serializer. This payload can be used to execute arbitrary commands on the vulnerable server.

Geonetwork 4.2.0 – XML External Entity (XXE)

GeoNetwork 3.1.x through 4.2.0 is vulnerable to XML External Entity (XXE) attack during rendering pdf of map. The XML parser is not configured securely to validate submitted XML document accepted from an untrusted source, which might result in arbitrary files retrieval from the server.

OctoBot WebInterface 0.4.3 – Remote Code Execution (RCE)

OctoBot WebInterface 0.4.3 is vulnerable to Remote Code Execution (RCE) due to improper input validation. An attacker can send a malicious payload to the /commands/run_command endpoint to execute arbitrary code on the target system. This exploit was tested on Linux (Ubuntu, CentOs).

CodoForum v5.1 – Remote Code Execution (RCE)

CodoForum v5.1 is vulnerable to a Remote Code Execution (RCE) vulnerability. An authenticated attacker can upload a malicious PHP file to the server and execute arbitrary code. This exploit was discovered and written by Krish Pandey (@vikaran101).

Recent Exploits: