header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin KN Fix Your Title 1.0.1 – ‘Separator’ Stored Cross-Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability exists in WordPress Plugin KN Fix Your Title 1.0.1. An attacker can inject malicious JavaScript code into the 'Separator' input field and when the same functionality is triggered, the malicious code will be executed in the victim's browser.

WordPress Plugin Mimetic Books 0.2.13 – ‘Default Publisher ID field’ Stored Cross-Site Scripting (XSS)

Install WordPress 5.7.2, Install and activate Mimetic Books, Navigate to Settings >> Mimetic Books API and enter the XSS payload into the Default Publisher ID input field, Click Save Changes, Payload Used: '><script>alert(document.cookie)</script>

WordPress Plugin LearnPress 3.2.6.8 – Privilege Escalation

WordPress Plugin LearnPress version 3.2.6.8 is vulnerable to privilege escalation. An attacker can exploit this vulnerability by finding out their user id and executing the payload http://<host>/wp-admin/?action=accept-to-be-teacher&user_id=<your_id>

Aruba Instant 8.7.1.0 – Arbitrary File Modification

This exploit allows an attacker to modify arbitrary files on Aruba Instant devices running versions 6.4.x: 6.4.4.8-4.2.4.17 and below, 6.5.x: 6.5.4.18 and below, 8.3.x: 8.3.0.14 and below, 8.5.x: 8.5.0.11 and below, 8.6.x: 8.6.0.6 and below, 8.7.x: 8.7.1.0 and below. The exploit uses a race condition between the PAPI message and telnet to gain access to the device's configuration. The attacker can then use the credentials obtained from the telnet session to log in to the device and retrieve the configuration.

Seagate BlackArmor NAS sg2000-2000.1331 – Command Injection

This exploit allows an attacker to execute arbitrary commands on the vulnerable Seagate BlackArmor NAS sg2000-2000.1331 device. The exploit is triggered by sending a specially crafted HTTP request to the localJob.php page, which contains a malicious command that is executed by the vulnerable device.

ForgeRock Access Manager/OpenAM 14.6.3 – Remote Code Execution (RCE) (Unauthenticated)

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages.The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted/ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO)found in versions of Java 8 or earlier.

WordPress Plugin Current Book 1.0.1 – ‘Book Title and Author field’ Stored Cross-Site Scripting (XSS)

Install WordPress 5.7.2, Install and activate Custom Book, Navigate to Tools >> Current Book and enter the XSS payload into the Book and Author input field, Click Update Options, You will observe that the payload successfully got stored into the database and when you are triggering the same functionality at that time JavaScript payload is executing successfully and we are getting a pop-up.

Webmin 1.973 – ‘save_user.cgi’ Cross-Site Request Forgery (CSRF)

This vulnerability allows an attacker to create a malicious web page that, when visited by an authenticated user, will modify the user's settings in Webmin. This vulnerability affects all versions of Webmin <= 1.973.

Recent Exploits: