header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Angular-Base64-Upload Library 0.1.20 – Remote Code Execution (RCE)

The Angular-Base64-Upload Library version 0.1.20 is vulnerable to Remote Code Execution (RCE) prior to v0.1.21. An unauthenticated attacker can exploit this vulnerability to execute arbitrary code on the target system. This exploit has been assigned CVE-2024-42640 with a severity rating of Critical (CVSS 10.0).

Fortinet FortiOS, FortiProxy, and FortiSwitchManager 7.2.0 – Authentication bypass

An authentication bypass vulnerability in Fortinet FortiOS, FortiProxy, and FortiSwitchManager API allows unauthorized access to a selected account. By exploiting this vulnerability, an attacker can add an SSH key to the authorized_keys file of the chosen account, enabling them to log in to the system with that account. Successful exploitation can lead to remote code execution.

WBCE CMS <= v1.6.3 Authenticated Remote Code Execution (RCE)

The exploit allows for authenticated remote code execution in WBCE CMS version 1.6.3 and prior. It involves creating a malicious module .zip file that, when uploaded and installed through the admin page, triggers the execution of a shell script. This exploit was authored by Swammers8.

Aztech DSL5005EN Router Admin Password Change Vulnerability

The Aztech DSL5005EN router/modem allows an attacker to change the admin password without authentication, by sending a crafted HTTP request to the 'sysAccess.asp' endpoint. This could lead to unauthorized access and control of the device.

Microsoft Office 2019 MSO Build 1808 – NTLMv2 Hash Disclosure

The exploit involves abusing MS Office URI schemes to fetch a document from a remote source. By invoking a specific URI scheme on a victim computer, an attacker can capture and relay NTLMv2 hash over SMB and HTTP.

ResidenceCMS 2.10.1 – Stored Cross-Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability is found in ResidenceCMS 2.10.1. This vulnerability permits a user with low privileges to insert malicious HTML content as a stored XSS payload within property pages. When the affected property page is accessed by any user, including the administrator, the XSS payload gets executed.

Pymatgen 2024.1 – Remote Code Execution (RCE)

The exploit allows an attacker to achieve Remote Code Execution (RCE) on Pymatgen 2024.1 by crafting a malicious CIF file with a reverse shell payload. By triggering the Pymatgen CIF parser to parse this file, an attacker can execute arbitrary commands on the target system.

Recent Exploits: