header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apache HTTP Server 2.4.49 – Path Traversal & Remote Code Execution (RCE)

This exploit allows an attacker to perform path traversal and remote code execution on Apache HTTP Server version 2.4.49. By manipulating the path parameter, an attacker can access sensitive files on the server and execute arbitrary commands. The vulnerability is identified by CVE-2021-41773.

WordPress Plugin BulletProof Security 5.1 – Sensitive Information Disclosure

The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.

Mitrastar GPT-2541GNAC-N1 – Privilege escalation

Mitrastar GPT-2541GNAC-N1 devices are provided with access through ssh into a restricted default shell. The command 'deviceinfo show file <path>' is used from reduced CLI to show files and directories. Because this command does not handle special characters correctly, it is possible to insert a second command as a parameter on the <path> value. By using '&&/bin/bash' as the parameter value, we can spawn a bash console with root privileges.

WordPress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities

The plugin allows for file disclosure and cross-site scripting vulnerabilities. The file disclosure vulnerability allows an attacker to view the config data of Wordpress, including the mysql-server username and password. The cross-site scripting vulnerabilities allow an attacker to execute malicious code on the affected site.

WordPress Plugin TranslatePress 2.0.8 – Stored Cross-Site Scripting (XSS) (Authenticated)

The plugin does not implement a proper filter on the 'translated' parameter when input to the database. The 'trp_sanitize_string' function only check the "<script></script>" with the preg_replace, the attacker can use the HTML Tag to execute javascript.

Cyberfox Web Browser 52.9.1 – Denial of Service (PoC)

The exploit is a proof-of-concept for a Denial of Service vulnerability in Cyberfox Web Browser version 52.9.1. By running a Python script, it creates a large payload that causes the browser to crash when the content is copied and pasted into the search bar.

Ether_MP3_CD_Burner 1.3.8 – Buffer Overflow (SEH)

The Ether_MP3_CD_Burner software version 1.3.8 is vulnerable to a buffer overflow attack. By providing a specially crafted input to the 'Name and Code Field' during the registration process, an attacker can execute arbitrary code on the target system. This can lead to remote code execution and compromise of the affected system. The vulnerability is caused by insufficient bounds checking of user-supplied data.

Redragon Gaming Mouse – ‘REDRAGON_MOUSE.sys’ Denial of Service (PoC)

This exploit demonstrates a denial of service vulnerability in the Redragon Gaming Mouse driver ('REDRAGON_MOUSE.sys'). By sending a specially crafted IOCTL request to the driver, an attacker can cause the system to crash or become unresponsive, resulting in a denial of service condition.

Gurock Testrail 7.2.0.3014 – ‘files.md5’ Improper Access Control

Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.

0day Total Video Player V1.03 .m3u file Local Buffer Overflow

This exploit allows an attacker to craft a malicious playlist file (.m3u) that causes a buffer overflow in Total Video Player V1.03. By overwriting the stack and corrupting the SEH handler, the attacker can gain control of the ECX register and potentially the EIP and ESI registers. The exploit is credited to fl0 fl0w with special thanks to Expanders.

Recent Exploits: