header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin visitors-app 0.3 – ‘user-agent’ Stored Cross-Site Scripting (XSS)

A vulnerability in the Wordpress plugin 'visitors' version 0.3 and prior allows remote attacker through Cross-Site Scripting (XSS) to redirect administrators and visitors and potentially obtain sensitive informations. The 'user-agent' parameter allows attacker to escalate their privileges.

OpenCart 3.0.3.7 – ‘Change Password’ Cross-Site Request Forgery (CSRF)

OpenCart is an open source shoping cart system, suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. OpenCart is not using any security token to prevent it against CSRF. It is vulnerable to all location inside User panel.

OpenCart 3.0.3.6 – ‘subject’ Stored Cross-Site Scripting

Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application. This vulnerability can results attacker to inject the XSS payload in Subject field of the mail and each time any user will open that mail of the website, the XSS triggers and attacker can able to steal the cookie according to the crafted payload.

WordPress Plugin wpDiscuz 7.0.4 – Remote Code Execution (Unauthenticated)

WordPress Plugin wpDiscuz 7.0.4 is vulnerable to a Remote Code Execution vulnerability. An unauthenticated attacker can exploit this vulnerability to upload a malicious PHP webshell and execute arbitrary code on the target system. This vulnerability is due to the lack of proper validation of the uploaded file. The vulnerability is tracked as CVE-2020-24186.

WordPress Plugin wpDiscuz 7.0.4 – Arbitrary File Upload (Unauthenticated)

This exploit allows an unauthenticated attacker to upload a webshell to the vulnerable Wordpress Plugin wpDiscuz 7.0.4. The attacker can then use the webshell to execute arbitrary commands on the server. This exploit was discovered by Chloe Chamberland and further developed by Juampa Rodríguez aka UnD3sc0n0c1d0.

Rocket.Chat 3.12.1 – NoSQL Injection to RCE (Unauthenticated)

This exploit is for Rocket.Chat 3.12.1, which is vulnerable to NoSQL Injection to RCE. The exploit involves sending a password reset email to a low privilege user, using the NoSQL injection to get the token, changing the password, logging in as the low privilege user, getting the admin ID, getting the admin 2FA status, getting the admin secret, getting the admin code, logging in as the admin, and finally executing the RCE.

WordPress Plugin Smart Slider-3 3.5.0.8 – ‘name’ Stored Cross-Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability exists in the WordPress Plugin Smart Slider-3 3.5.0.8. An attacker can exploit this vulnerability by entering a malicious JavaScript payload into the 'Name' field when creating a new project. This will cause the malicious JavaScript payload to be stored and executed when the project is viewed. This can lead to the theft of cookies, user redirection to a malicious website, and malicious code execution.

Recent Exploits: