header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

File Thingie 2.5.7 – Arbitary File Upload to RCE

This exploit allows an attacker to upload a malicious file to the File Thingie 2.5.7 web application, which can then be used to execute arbitrary code on the server. The exploit works by creating a new folder, zipping a malicious payload, and then uploading it to the server. Once the payload is uploaded, the attacker can trigger it by sending a specially crafted HTTP request.

Ulicms-2023.1 sniffing-vicuna – Stored Cross-Site Scripting (XSS)

Ulicms is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability. An attacker can upload a malicious SVG file containing a malicious JavaScript code which will be executed when the SVG file is accessed. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Codigo Markdown Editor v1.0.1 (Electron) – Arbitrary Code Execution

A vulnerability was discovered on Codigo markdown editor v1.0.1 allowing a user to execute arbitrary code by opening a specially crafted file. Create a markdown file (.md) in any text editor and write the following payload: <video><source onerror="alert(require('child_process').execSync('/System/Applications/Calculator.app/Contents/MacOS/Calculator').toString());"> Opening the file in Codigo will auto execute the Calculator application.

EasyPHP Webserver 14.1 – Multiple Vulnerabilities (RCE and Path Traversal)

There is an OS Command Injection in EasyPHP Webserver 14.1 that allows an attacker to achieve Remote Code Execution (RCE) with administrative privileges. An Absolute Path Traversal vulnerability in / allows remote users to bypass intended SecurityManager restrictions and download any file if you have adequate permissions outside the documentroot configured on the server.

Online Pizza Ordering System 1.0 – Unauthenticated File Upload

This exploit allows an attacker to upload a malicious PHP webshell to the Online Pizza Ordering System 1.0. The attacker can then use the webshell to gain access to the server and execute arbitrary code.

Jedox 2020.2.5 – Disclosure of Database Credentials via Improper Access Controls

Improper access controls in /tc/rpc allows remote authenticated users to view details of database connections via the class com.jedox.etl.mngr.Connections and the method getGlobalConnection. To exploit the vulnerability, the attacker must know the name of the database connection.

Jedox 2022.4.2 – Disclosure of Database Credentials via Connection Checks

An information disclosure vulnerability in /be/rpc.php allows remote authenticated users with the appropriate permissions to modify database connections to disclose the clear text credentials via the test connection function. To exploit the vulnerability, the attacker must set the host of the database connection to a server under his control.

Jedox 2020.2.5 – Remote Code Execution via Executable Groovy-Scripts

Jedox Integrator allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts. To exploit the vulnerability, the attacker must be able to create a Groovy-Job in Integrator.

Jedox 2020.2.5 – Remote Code Execution via Configurable Storage Path

Incorrect input validation for the default storage path variable in the settings page allows remote, authenticated users to specify the location as web root directory. Consecutive file uploads can lead to the execution of arbitrary code. To exploit the vulnerability, the attacker sets the default storage path to the web root.

Recent Exploits: