header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugins – wpStoreCart Arbitrary File Upload Vulnerability

An arbitrary file upload vulnerability exists in the wpStoreCart plugin for WordPress. A remote attacker can exploit this vulnerability to upload arbitrary PHP code and execute it in the context of the webserver process. The vulnerable plugin version is 2.5.27 - 2.5.29. An attacker can use the Google Dork 'inurl:/wp-content/plugins/wpstorecart/' to find vulnerable websites. The exploit code is a PHP script that uses cURL to upload a malicious PHP file to the vulnerable website. The uploaded file can be accessed at http://www.example.com/wordpress/wp-content/uploads/wpstorecart/lo.php.

WordPress Plugins – Tinymce Thumbnail Gallery Remote File Disclosure Vulnerability

A vulnerability in the Tinymce Thumbnail Gallery plugin for Wordpress allows an attacker to download arbitrary files from the server. This is due to the download-image.php script in the plugin not properly validating user-supplied input. An attacker can craft a URL to download any file from the server, such as the wp-config.php or /etc/passwd file.

WordPress Plugins – Thinkun Remind Remote File Disclosure Vulnerability

A remote file disclosure vulnerability exists in the Thinkun Remind plugin version 1.1.3 for Wordpress. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the exportData.php script, which is located in the plugin directory, with the dirPath parameter set to a file path. This will allow the attacker to view the contents of the file.

WordPress Plugins – Simple Download Button Shortcode Remote File Disclosure Vulnerability

This vulnerability allows an attacker to access sensitive files on the server by exploiting a flaw in the Simple Download Button Shortcode plugin for Wordpress. By sending a specially crafted request to the simple-download-button_dl.php script, an attacker can access files outside of the web root directory, such as the wp-config.php and /etc/passwd files.

WordPress Plugins – RBX Gallery Multiple Arbitrary File Upload Vulnerability

A vulnerability in RBX Gallery plugin for Wordpress allows an attacker to upload arbitrary files to the server. This can be exploited by sending a specially crafted POST request to the uploader.php script in the plugin directory. This can be used to upload malicious files such as a web shell, allowing an attacker to gain remote access to the server.

WordPress Plugins – PICA Photo Gallery Remote File Disclosure Vulnerability

A vulnerability in the PICA Photo Gallery plugin for Wordpress allows an attacker to download arbitrary files from the server. This is due to the lack of input validation in the 'imgname' parameter of the 'picadownload.php' script, which allows an attacker to access files outside of the intended directory.

WordPress Plugins – Easy Contact Forms Export Information Disclosure Vulnerability

A vulnerability in the Easy Contact Forms Export plugin for Wordpress allows an attacker to access sensitive information from the server. By accessing the downloadcsv.php file with a crafted URL, an attacker can access the /etc/passwd file.

Recent Exploits: