header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Linux Kernel 5.1.x – ‘PTRACE_TRACEME’ pkexec Local Privilege Escalation (2)

This exploit targets the 'PTRACE_TRACEME' vulnerability in the Linux Kernel 5.1.x version. It leverages the PolKit_Exec frontend and PolKit_Action to escalate privileges locally. The exploit code has been modified from the original discovery by Jann Horn and the exploit code by BColes. It accesses variables, initiates the SUID process, and attaches to the midpid for further exploitation.

Quick.CMS 6.7 – Cross Site request forgery (CSRF) to Cross-site Scripting (XSS) (Authenticated)

The Quick.CMS version 6.7 is vulnerable to Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) attacks. An authenticated attacker can exploit this vulnerability to perform actions on behalf of the victim user and execute malicious scripts in the victim's browser.

WordPress Plugin Contact Form to Email 1.3.24 – Stored Cross Site Scripting (XSS) (Authenticated)

The WordPress plugin Contact Form to Email version 1.3.24 is vulnerable to stored cross-site scripting (XSS) attacks. An authenticated attacker can create a new form with a malicious script as the form name. When the form is published, the XSS payload is executed when the form is accessed.

Recent Exploits: