header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin XCloner 4.2.12 – Remote Code Execution (Authenticated)

An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.

ES File Explorer 4.1.9.7.4 – Arbitrary File Read

This exploit allows an attacker to read arbitrary files on a target system using the ES File Explorer app. The vulnerability is identified by CVE-2019-6447. By sending a specially crafted request to the app, an attacker can bypass file access restrictions and read files that they should not have access to. This can lead to unauthorized disclosure of sensitive information.

Lexmark Printer Software G2 Installation Package 1.8.0.0 – ‘LM__bdsvc’ Unquoted Service Path

A successful attempt to exploit this vulnerability requires the attacker to insert an executable file into the service path undetected by the OS or some security application. When restarting the service or the system, the inserted executable will run with elevated privileges.

iFunbox 4.2 – ‘Apple Mobile Device Service’ Unquoted Service Path

A successful attempt to exploit this vulnerability requires the attacker to insert an executable file into the service path undetected by the OS or some security application. When restarting the service or the system, the inserted executable will run with elevated privileges.

Solaris SunSSH 11.0 x86 – libpam Remote Root (3)

CVE-2020-14871 is a critical pre-authentication (via SSH) stack-based buffer overflow vulnerability in the Pluggable Authentication Module (PAM) in Oracle Solaris. PAM is a dynamic authentication component that was integrated into Solaris back in 1997 as part of Solaris 2.6. The vulnerability received a CVSSv3 score of 10.0, the maximum possible score.

Wise Care 365 5.6.7.568 – ‘WiseBootAssistant’ Unquoted Service Path

A successful attempt to exploit this vulnerability requires the attacker to insert an executable file into the service path undetected by the OS or some security application. When restarting the service or the system, the inserted executable will run with elevated privileges.

Cotonti Siena 0.9.19 – ‘maintitle’ Stored Cross-Site Scripting

The Cotonti Siena 0.9.19 application is vulnerable to stored cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by entering a malicious payload in the 'maintitle' parameter in the Configuration tab of the Admin Panel. When the payload is saved and the home page is accessed, the XSS attack is triggered, allowing the execution of arbitrary JavaScript code.

Disk Sorter Server 13.6.12 – ‘Disk Sorter Server’ Unquoted Service Path

The Disk Sorter Server software version 13.6.12 is vulnerable to an unquoted service path vulnerability. This vulnerability occurs when the service path is not surrounded by quotation marks. An attacker with local access to the system could potentially exploit this vulnerability to execute arbitrary code with elevated privileges.

Recent Exploits: