header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Usermin 1.820 – Remote Code Execution (RCE) (Authenticated)

Usermin version 1.820 is vulnerable to a Remote Code Execution (RCE) attack when an authenticated user is able to inject malicious code into the GnuPG setup page. This code is then executed when the user logs in. An attacker can use this vulnerability to gain access to the system and execute arbitrary code.

ZesleCP 3.1.9 – Remote Code Execution (RCE) (Authenticated)

ZesleCP 3.1.9 is vulnerable to Remote Code Execution (RCE) when an authenticated user sends a malicious payload to the /json-api/cpanel endpoint. The payload creates a FTP account with a malicious command that is executed when the FTP account is created. This allows an attacker to execute arbitrary code on the server.

COMMAX WebViewer ActiveX Control 2.1.4.5 – ‘Commax_WebViewer.ocx’ Buffer Overflow

The vulnerability is caused due to a boundary error in the processing of user input, which can be exploited to cause a buffer overflow when a user inserts overly long array of string bytes through several functions. Successful exploitation could allow execution of arbitrary code on the affected node.

ProcessMaker 3.5.4 – Local File inclusion

ProcessMaker 3.5.4 is vulnerable to Local File Inclusion. An attacker can use curl to send a malicious request to the target server and read the content of the file. The attacker can also use Jaeles Scanner to scan the target server for this vulnerability.

Online Leave Management System 1.0 – Arbitrary File Upload to Shell (Unauthenticated)

This exploit allows an unauthenticated attacker to upload a malicious file to the target system. The malicious file contains a reverse shell payload which can be used to gain access to the target system. The exploit is tested on Linux.

HP OfficeJet 4630/7110 MYM1FN2025AR 2117A – Stored Cross-Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability exists in HP OfficeJet 4630/7110 MYM1FN2025AR 2117A. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable device via a PUT request. The payload is then stored in the device's configuration file, which is accessible via a GET request. This allows an attacker to execute arbitrary JavaScript code in the context of the vulnerable device.

RaspAP 2.6.6 – Remote Code Execution (RCE) (Authenticated)

A vulnerability in RaspAP 2.6.6 allows an authenticated user to execute arbitrary code on the target system. This is achieved by sending a malicious payload to the /wpa_conf endpoint, which is then executed by the system. The payload is sent using a POST request with the user's credentials, and the malicious code is stored in the 'connect' parameter.

Recent Exploits: