header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ELSE IF CMS Multiple vulnerabilities

The ELSE IF CMS has multiple vulnerabilities including remote file inclusion, remote file upload ability, XSS, full path disclosure, and a shell upload exploit. These vulnerabilities can be exploited to inject malicious files, upload files remotely, execute cross-site scripting attacks, disclose full file paths, and upload a shell.

DHCP Client Command Injection (DynoRoot)

This module exploits the DynoRoot vulnerability, a flaw in how the NetworkManager integration script included in the DHCP client in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier processes DHCP options. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.

Canon PrintMe EFI – Cross-Site Scripting

This exploit allows an attacker to inject malicious code into the Canon PrintMe EFI application, leading to a cross-site scripting (XSS) vulnerability. The vulnerability is triggered when the application fails to properly sanitize user input, allowing an attacker to execute arbitrary JavaScript code in the context of the victim's browser.

Pegasus Imaging ImagXpress 8.0 Remote Arbitrary File Overwrite

This component contains an insecure 'CompactFile()' method which overwrites arbitrary files on the user's PC. By passing an existing file as the first parameter and a desired file as the second parameter, the desired file will be overwritten.

Joomla! Component EkRishta 2.10 – ‘username’ SQL Injection

The Joomla! Component EkRishta 2.10 is vulnerable to a SQL Injection attack. The 'username' parameter is not properly sanitized, allowing an attacker to inject SQL code into the query. This can lead to unauthorized access, data manipulation, or other malicious activities.

Recent Exploits: