header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Jettweb PHP Hazir Haber Sitesi Scripti V2 – Authentication Bypass

This exploit allows an attacker to bypass authentication in the Jettweb PHP Hazir Haber Sitesi Scripti V2. By manipulating the username and password fields, an attacker can gain unauthorized access to the administration panel.

Jettweb PHP Hazir Haber Sitesi Scripti V1 – Multiple Vulnerabilities

The Jettweb PHP Hazir Haber Sitesi Scripti V1 is vulnerable to multiple SQL Injection vulnerabilities, allowing attackers to execute arbitrary SQL commands. Additionally, the script is also vulnerable to an authentication bypass vulnerability, which allows unauthorized access to the administration panel.

Jenkins ACL Bypass and Metaprogramming RCE

This module exploits a vulnerability in Jenkins dynamic routing to bypass the Overall/Read ACL and leverage Groovy metaprogramming to download and execute a malicious JAR file. The ACL bypass gadget is specific to Jenkins <= 2.137 and will not work on later versions of Jenkins.

Use-after-free vulnerability in FileSystemOperationRunner::BeginOperation

The BeginOperation function in FileSystemOperationRunner class in Chromium has a use-after-free vulnerability. If the id used in the BeginOperation function wraps around, it can cause a use-after-free in the browser process. The normal usage of BeginOperation function is to pass a unique_ptr to the operation, which is then moved into the operations_ map. However, if the id wraps around, it can free the operation prematurely, leading to a use-after-free vulnerability. This vulnerability can be triggered by a malformed blob in the blob registry or by accessing the FileWriter API. Currently, this vulnerability requires a compromised renderer to exploit.

Recent Exploits: