header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Telegram Desktop 2.9.2 – Denial of Service (PoC)

A denial of service vulnerability exists in Telegram Desktop 2.9.2, which allows an attacker to crash the application by creating a file with 9000000 bytes of data and pasting it into the “Write a message…” field. The file is created by running the python script which creates a file named “output.txt”.

WordPress Plugin Payments Plugin | GetPaid 2.4.6 – HTML Injection

The vulnerability exists in the WordPress Payments Plugin | GetPaid version 2.4.6, which allows an attacker to inject malicious HTML code into the 'Help Text' field of the Payment Form page. By exploiting this vulnerability, an attacker can inject malicious HTML code into the database and execute it successfully, resulting in the display of an image on the right hand side.

Traffic Offense Management System 1.0 – SQLi to Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable system by exploiting a SQL injection vulnerability in the Traffic Offense Management System 1.0. The attacker can bypass the authentication process by sending a crafted SQL query to the Login.php page. The attacker can then find the path of the vulnerable system and send a malicious payload to the server, which will be written to a file and executed.

Confluence Server 7.12.4 – ‘OGNL injection’ Remote Code Execution (RCE) (Unauthenticated)

Confluence Server and Data Center contain an OGNL injection vulnerability that could allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if 'Allow people to sign up to create their account' is enabled. To check whether this is enabled go to COG > User Management > User Signup Options.

WordPress Plugin ProfilePress 3.1.3 – Privilege Escalation (Unauthenticated)

ProfilePress WordPress plugin is susceptible to a vulnerability in the user registration component in the ~/src/Classes/RegistrationAuth.php file that makes it possible for users to register on sites as an administrator.

Strapi CMS 3.0.0-beta.17.4 – Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable Strapi CMS version 3.0.0-beta.17.4 or lower. The exploit works by resetting the password of the admin user and then using the JWT token to execute arbitrary code on the server. The exploit is tested on Ubuntu 20.04.

Strapi 3.0.0-beta.17.7 – Remote Code Execution (RCE) (Authenticated)

Strapi 3.0.0-beta.17.7 is vulnerable to Remote Code Execution (RCE) when an authenticated user sends a malicious payload to the /admin/plugins/install endpoint. This payload is executed in the context of the web server user. An attacker can use this vulnerability to execute arbitrary code on the server.

Bus Pass Management System 1.0 – ‘viewid’ SQL Injection

The viewid parameter of the Bus Pass Management System 1.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by entering a malicious SQL payload into the URL of the vulnerable page. This will result in an SQL error, which can be used to gain access to the system.

Recent Exploits: