header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adobe ColdFusion 11 – LDAP Java Object Deserialization Remote Code Execution (RCE)

ColdFusion allows an unauthenticated user to connect to any LDAP server. An attacker can exploit it to achieve remote code execution. JNDI attack via the 'verifyldapserver' parameter on the utils.cfc.

Microsoft Gaming Services 2.52.13001.0 – Unquoted Service Path

An unquoted service path in Microsoft.GamingServices_2.52.13001.0_x64__8wekyb3d8bbwe, could lead to privilege escalation during the installation process that is performed when an executable file is registered. This could further lead to complete

FileCloud 21.2 – Cross-Site Request Forgery (CSRF)

This exploit allows an attacker to perform Cross-Site Request Forgery (CSRF) attacks on FileCloud prior to version 21.3. By uploading a specially crafted CSV file, an attacker can create a user with arbitrary credentials and gain unauthorized access to the system.

WordPress Plugin WP User Frontend 3.5.25 – SQLi (Authenticated)

The WP User Frontend WordPress plugin before 3.5.26 does not validate and escape the status parameter before using it in a SQL statement in the Subscribers dashboard, leading to an SQL injection. Due to the lack of sanitisation and escaping, this could also lead to Reflected Cross-Site Scripting.

0day Total Video Player V1.20 .M3u File Local Stack Buffer Overflow

This exploit targets Total Video Player V1.20 and V1.30. By parsing a crafted .m3u file, a stack overflow occurs, corrupting the stack and allowing control of the EBP and EIP registers. The ESP register points to the retaddress position. A jump back and a JMP ESP are performed to gain control. This exploit has been tested on Windows XP SP2.

Connectify Hotspot 2018 ‘ConnectifyService’ – Unquoted Service Path

The Connectify Hotspot 2018 service 'ConnectifyService' has an unquoted service path, which can allow an attacker to escalate privileges by placing a malicious executable in a higher-level directory with the same name as the service.

Kyocera Command Center RX ECOSYS M2035dn – Directory Traversal File Disclosure (Unauthenticated)

The Kyocera Command Center RX ECOSYS M2035dn device is vulnerable to a directory traversal attack that allows an unauthenticated user to disclose sensitive files on the system. By crafting a specially crafted payload and adding a nullbyte at the end, an attacker can traverse directories and retrieve files that should not be accessible. This vulnerability can be exploited by sending a malicious GET request to the device.

Home Owners Collection Management System 1.0 – Remote Code Execution (RCE) (Authenticated)

The Home Owners Collection Management System (HOCMS) version 1.0 is vulnerable to remote code execution. An attacker can exploit this vulnerability by sending a specially crafted request to the SystemSettings.php file. By manipulating the 'name' parameter, an attacker can execute arbitrary code on the server. The vulnerability allows an authenticated attacker to execute system commands on the target server, potentially leading to full compromise of the system.

Recent Exploits: