header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Fusion < 9.03.00 - 'Edit Profile' Remote Code Execution

This module exploits command execution vulnerability in PHP-Fusion 9.03.00 and prior versions. It is possible to execute commands in the system with ordinary user authority. No need admin privilage. There is almost no control in the avatar upload section in the profile edit area. Only a client-based control working with javascript. (Simple pre-check) If we do not care about this control, the desired file can be sent to the server via Interception-Proxies. The module opens the meterpreter session for you by bypassing the controls.

SOCA Access Control System 180612 CSRF Add Admin Exploit

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

RICOH SP 4520DN Printer – HTML Injection

An HTML Injection vulnerability has been discovered on the RICOH SP 4520DN printer via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn or entryDisplayNameIn parameter. An attacker can inject arbitrary HTML code into the affected parameter, potentially leading to code execution or information disclosure.

Oracle Weblogic Server Deserialization RCE – AsyncResponseService

An unauthenticated attacker with network access to the Oracle Weblogic Server T3 interface can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host.

Chrome 72.0.3626.119 FileReader UaF exploit for Windows 7 x86

This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling ArrayBuffer reference can be used to access the sprayed objects, allowing arbitrary memory access from Javascript. This is used to write and execute shellcode in a WebAssembly object. The shellcode is executed within the Chrome sandbox, so you must explicitly disable the sandbox for the payload to be successful.

FTP Admin v0.1.0 – MULTIPLE VULNERABILITIES

The FTP Admin v0.1.0 web-based user administration tool is vulnerable to multiple vulnerabilities including XSS, Local File Inclusion, and Admin Bypass. The XSS vulnerability allows an attacker to inject arbitrary HTML or script code into the error parameter of the index.php page. The Local File Inclusion vulnerability allows an attacker to include arbitrary local files by manipulating the page parameter of the index.php page. The Admin Bypass vulnerability allows an attacker to bypass authentication by manipulating the loggedin parameter of the index.php page.

LearnLoop 2.0beta7 (sFilePath) Remote File Disclosure Vulnerability

The vulnerability allows an attacker to disclose files from the target system by manipulating the 'sFilePath' parameter in the 'file_download.php' script. By traversing the directory structure with '../', an attacker can access sensitive files such as '/etc/passwd'.

Recent Exploits: