header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin WP Prayer version 1.6.1 – ‘prayer_messages’ Stored Cross-Site Scripting (XSS) (Authenticated)

A stored cross-site scripting (XSS) vulnerability exists in WordPress Plugin WP Prayer version 1.6.1 and earlier. An authenticated user can inject malicious JavaScript code into the 'prayer_messages' field of the prayer request form. When the form is submitted, the malicious code is stored in the database and is executed when the page with the prayer requests is loaded. This can be used to steal user credentials or perform other malicious actions.

Ubee EVW327 – ‘Enable Remote Access’ Cross-Site Request Forgery (CSRF)

This exploit enables remote access on Ubee EVW327 routers by exploiting a Cross-Site Request Forgery (CSRF) vulnerability. The exploit is executed by submitting a POST request to the router's web interface with the parameters RemoteAccessEnable, RemoteAccessPort, and ApplyRemoteEnableAction set to 1. This will enable remote access on the router and open port 8080.

ProjeQtOr Project Management 9.1.4 – Remote Code Execution

A malicious file can be run with arbitrary file upload in the profile editing section. A malicious file can be created with php code and uploaded to the profile editing section. The malicious file can then be called with the .projeqtor statement added to the file extension.

LogonTracer 1.2.0 – Remote Code Execution (Unauthenticated)

LogonTracer 1.2.0 is vulnerable to remote code execution due to an insecure deserialization vulnerability. An attacker can send a malicious payload to the vulnerable endpoint, which will be executed on the server. This exploit uses a python reverse shell payload to connect back to the attacker's machine.

WordPress Plugin LifterLMS 4.21.0 – Stored Cross-Site Scripting (XSS)

The 'State' field of the Edit profile page of the LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin for WordPress plugin before 4.21.1 is not properly sanitised when output in the About section of the profile page, leading to a stored Cross-Site Scripting issue. This could allow low privilege users (such as students) to elevate their privilege via an XSS attack when an admin will view their profile.

PHPFusion 9.03.50 – Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a vulnerable PHPFusion 9.03.50 server with 'Allow PHP Execution' enabled. The exploit works by sending a malicious payload encoded in base64 to the target server, which is then decoded and executed. The payload is a reverse shell that connects back to the attacker's machine.

Recent Exploits: