header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NRPE <= 2.15 Remote Code Execution Vulnerability

NRPE <= 2.15 Remote Command Execution Vulnerability is a vulnerability in the Nagios Remote Plugin Executor (NRPE) which allows an attacker to execute arbitrary commands on the vulnerable system. Discovered by Dawid Golunski, this vulnerability is rated as high severity with a CVSS score of 9.0. It affects versions of NRPE from 2.15 and below. The vulnerability can be exploited by sending a maliciously crafted packet to the NRPE service. The pyOpenSSL library is required to exploit this vulnerability. Mitigation for this vulnerability includes upgrading to a version of NRPE that is not affected by this vulnerability.

Unspecified Vulnerability in Adobe Flash Player

This exploit is related to an unspecified vulnerability in Adobe Flash Player. The vulnerability is exploited by a malicious SWF file embedded in a web page. The malicious SWF file is used to create a heap spray which is used to overwrite the return address of a function and execute arbitrary code. The vulnerability is triggered when the user visits a malicious web page.

User credential disclosure in ManageEngine DeviceExpert 5.9

DeviceExpert is a web–based, multi vendor network change, configuration and compliance management (NCCCM) solution for switches, routers, firewalls and other network devices. A vulnerability was discovered in the product which allowed for user credential disclosure without any authentication or other information needed. The passwords are a salted MD5 hash. Affected versions are UNFIXED as of 27/08/2014 - current version 5.9 build 5980 is vulnerable, older versions likely vulnerable.

Plogger Authenticated Arbitrary File Upload

This exploit allows an authenticated user to upload a malicious file to the Plogger application. The exploit creates a poisoned gift, which is a zip file containing a malicious PHP file and a true image file. The malicious file is uploaded to the Plogger application and can be accessed by the attacker.

WordPress ShortCode Plugin – Local File Inclusion Vulnerability

A Local File Inclusion vulnerability exists in the WordPress ShortCode Plugin, version 0.2.3, which allows an attacker to include a file from the local system. The vulnerability is due to the 'file' parameter in the 'force-download.php' script not properly sanitizing user input. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal characters (e.g., '../') to the vulnerable script. This can allow the attacker to include and execute arbitrary files from the local system.

WooCommerce Store Exporter v1.7.5 Stored XSS

An attacker creates a malicious page as shown below and uploads it on a server under attacker's control. When a WordPress administrator visits the malicious page above, a JavaScript code which prompts administrator's cookies will be saved on the victim's website. The attacker could send the URL pointing to the malicious webpage in an email or posting it on a website.

CVE-2014-5119 glibc __gconv_translit_find() exploit

A buffer overflow vulnerability in the glibc library's __gconv_translit_find() function can be exploited to gain arbitrary code execution. The vulnerability is caused by a lack of proper bounds checking when processing environment variables. An attacker can exploit this vulnerability by setting a specially crafted environment variable before executing a vulnerable program. This will cause the program to crash, or potentially execute arbitrary code, when the __gconv_translit_find() function is called.

Recent Exploits: