header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sourcegraph Gitserver 3.36.3 – Remote Code Execution (RCE)

Sourcegraph prior to 3.37.0 has a remote code execution vulnerability on its gitserver service. This is due to lack of restriction on git config execution thus 'core.sshCommand' can be passed on the HTTP arguments which can contain arbitrary bash commands. Note that this is only possible if gitserver is exposed to the attacker. This is tested on Sourcegraph 3.36.3

phpIPAM 1.4.5 – Remote Code Execution (RCE) (Authenticated)

This exploit allows an authenticated user to execute arbitrary code on the vulnerable system. The exploit works by sending a specially crafted POST request to the import_export.php page, which allows the user to upload a file. The exploit takes advantage of this functionality by sending a malicious PHP file which contains a system command. The command is then executed on the vulnerable system and the output is saved in a file in a writable system folder.

TP-Link Router AX50 firmware 210730 – Remote Code Execution (RCE) (Authenticated)

A vulnerability in TP-Link Router AX50 firmware 210730 allows an authenticated attacker to execute arbitrary code on the device. This is achieved by importing a malicious config file. The vulnerability is due to insufficient validation of user-supplied input.

Pandora FMS v7.0NG.742 – Remote Code Execution (RCE) (Authenticated)

index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v7.0 NG allows authenticated administrators to upload malicious PHP scripts, and execute them via base64 decoding of the file location. This affects v7.0NG.742_FIX_PERL2020.

Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)

Due to bad sanitation in http://<IP:PORT>/control/fm-data.lua, an attacker can do command injection as root by sending a POST request with the formdata action: rename, source: /a";echo $({command}) 2>&1 > /opt/algo/web/root/a.txt;" and target: /.

HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path

The local user able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Marval MSM v14.19.0.12476 – Cross-Site Request Forgery (CSRF)

Marval MSM v14.19.0.12476 is vulnerable to Cross-Site Request Forgery (CSRF). An attacker can craft a malicious HTML page that contains a form with an action pointing to the vulnerable application. When a logged-in user visits the malicious page, the form will be automatically submitted, allowing the attacker to perform actions with the same privileges as the user.

Avantune Genialcloud ProJ 10 – Cross-Site Scripting (XSS)

Reflected Cross-Site Scripting (XSS) vulnerability in login-portal webpage of Genialcloud ProJ (and potentially in other platforms from the same software house "Avantune" since codebase seems shared with their other products: Facsys and Analysis) allows remote attacker to inject and execute arbitrary web scripts or HTML via a crafted payload. Request parameters affected is "msg".

Recent Exploits: