header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AirControl 1.4.2 – PreAuth Remote Code Execution

A vulnerability in AirControl <= 1.4.2 allows an attacker to execute arbitrary code on the target system. This is achieved by sending a crafted HTTP request to the vulnerable server, which contains a malicious payload in the form of a Java expression. This expression is then evaluated by the server, allowing the attacker to execute arbitrary code on the target system.

OpenCart 3.0.3.2 – Stored Cross Site Scripting (Authenticated)

OpenCart versions prior to 3.0.3.2 are vulnerable to a stored cross-site scripting vulnerability. An authenticated attacker can exploit this vulnerability by uploading a malicious image file containing an XSS payload to the Image Manager section. This payload will be executed each time someone visits the Image Manager section.

WordPress Plugin BBPress 2.5 – Unauthenticated Privilege Escalation

WordPress Plugin BBPress version 2.5 is vulnerable to an unauthenticated privilege escalation vulnerability. An attacker can exploit this vulnerability by sending a crafted POST request to the login page of the WordPress website. The request contains the username, password, email address, and the bbp-forums-role parameter set to bbp_keymaster. This will create a new user with the keymaster role, allowing the attacker to gain full access to the WordPress website.

QNAP QTS and Photo Station 6.0.3 – Remote Command Execution

This exploit allows an attacker to execute arbitrary commands on vulnerable QNAP QTS and Photo Station 6.0.3 devices. The vulnerability exists due to improper validation of user-supplied input in the web application. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. Successful exploitation of this vulnerability can result in unauthorized access to the application.

EyouCMS 1.4.6 – Persistent Cross-Site Scripting

EyouCMS V1.4.6 is vulnerable to Persistent Cross-Site Scripting. An attacker can send a malicious POST request to the vulnerable application with a crafted payload in the 'addonFieldExt[content]' parameter. This will result in a persistent XSS vulnerability which can be used to steal user's cookies and other sensitive information.

Recent Exploits: