header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP utility belt Remote Code Execution vulnerability

PHP utility belt is a set of tools for PHP developers. Install in a browser-accessible directory and have at it. ajax.php is accessible without any authentication. The vulnerable code allows an attacker to execute arbitrary code by sending a POST request with the code parameter set to the malicious code. This can be exploited to create a malicious PHP file, such as info.php, which can be used to display the PHP info page.

OpenMRS 2.3 (1.11.4) Local File Disclosure Vulnerability

OpenMRS suffers from a file disclosure vulnerability when input passed thru the 'url' parameter to viewPortlet.htm script is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks.

OpenMRS 2.3 (1.11.4) Multiple Cross-Site Scripting Vulnerabilities

OpenMRS suffers from multiple stored and reflected cross-site scripting vulnerabilities when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

OpenMRS 2.3 (1.11.4) Expression Language Injection Vulnerability

Input passed via the 'personType' parameter is not properly sanitised in the spring's expression language support via 'addPerson.htm' script before being used. This can be exploited to inject expression language (EL) and subsequently execute arbitrary Java code.

OpenMRS 2.3 (1.11.4) XML External Entity (XXE) Processing PoC Exploit

The vulnerability is caused due to an error when parsing XML entities within ZIP archives and can be exploited to e.g. disclose data from local resources or cause a DoS condition (billion laughs) via a specially crafted XML file including external entity references.

Recent Exploits: