header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GFI Mail Archiver 15.1 – Telerik UI Component Arbitrary File Upload (Unauthenticated)

This exploit allows an unauthenticated attacker to upload arbitrary files to the GFI Mail Archiver software. The vulnerability exists in the Telerik UI component used by the software, which allows unrestricted file upload. By exploiting this vulnerability, an attacker can upload malicious files to the server, potentially leading to remote code execution or unauthorized access to sensitive information.

Moodle 3.9 – Remote Code Execution (RCE) (Authenticated)

This exploit allows an authenticated user with teacher privileges to execute arbitrary code on a Moodle 3.9 instance. The exploit is based on a proof of concept (PoC) and payload that assigns full permissions to the manager role. The exploit script assigns the necessary permissions to the teacher role, allowing for code execution.

CMSuno 1.7 – ‘tgo’ Stored Cross-Site Scripting (XSS) (Authenticated)

CMSuno version 1.7 and prior is vulnerable to a stored cross-site scripting. The attacker must be authenticated to exploit the vulnerability. The payload injection is done while updating the template's image filename, vulnerable parameter is *tgo*.

KevinLAB BEMS 1.0 – File Path Traversal Information Disclosure (Authenticated)

The BEMS suffers from an authenticated arbitrary file disclosure vulnerability. Input passed through the 'page' GET parameter in index.php is not properly verified before being used to include files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.

PEEL Shopping 9.3.0 – ‘id’ Time-based SQL Injection

PEEL Shopping is an eCommerce shopping cart application in PHP / MySQL which works on any hosting. Public user/guest (unauthenticated) can inject malicious SQL query in order to affect the execution of predefined SQL commands via the "id" parameter on the "/peel-shopping_9_4_0/achat/produit_details.php?id=[SQLi]" endpoint. Upon successful of SQL injection attack, attacker can read sensitive data from the database or modify database data.

WordPress Plugin LearnPress 3.2.6.7 – ‘current_items’ SQL Injection (Authenticated)

The WordPress plugin LearnPress version 3.2.6.7 is vulnerable to an authenticated SQL injection vulnerability in the 'current_items' parameter. An attacker with authenticated access can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized access or data leakage.

Argus Surveillance DVR 4.0 – Weak Password Encryption

This exploit demonstrates weak password encryption in Argus Surveillance DVR 4.0. The author, Salman Asad (@deathflash1411), also known as LeoBreaker, provides a detailed description of the exploit and a guide on how to crack the password hash.

Recent Exploits: