header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PaperStream IP (TWAIN) 1.42.0.5685 – Local Privilege Escalation

A DLL hijack vulnerability exists in the FJTWSVIC service running as part of the Fujitsu PaperStream IP (TWAIN) software package. This exploit searches for a writable location, copies the specified DLL to that location and then triggers the DLL load by sending a message to FJTWSVIC over the FjtwMkic_Fjicube_32 named pipe.

Resumes Management and Job Application Website 1.0 – RCE (Unauthenticated)

The Resumes Management and Job Application Website 1.0 allows unauthenticated users to upload resume files. By uploading a PHP file with malicious code, an attacker can execute arbitrary commands on the server and gain unauthorized access. The provided exploit code uploads a PHP file named 'rce.php' containing a command to retrieve the current user's information using the 'whoami' command. When accessing the uploaded file through the URL, the output of the 'whoami' command is displayed.

WordPress Plugin WP24 Domain Check 1.6.2 – ‘fieldnameDomain’ Stored Cross Site Scripting

The 'fieldnameDomain' parameter in the WP24 Domain Check plugin for WordPress version 1.6.2 is vulnerable to stored cross-site scripting (XSS) attacks. An attacker can inject malicious JavaScript code into the 'fieldnameDomain' field, which will be executed when the field is focused. This can lead to session hijacking, cookie theft, and other malicious activities.

Expense Tracker 1.0 – ‘Expense Name’ Stored Cross-Site Scripting

This vulnerability allows an attacker to inject malicious payloads in the Expense Category section and paste the payload in the desired field. Each time the admin or user visits and manages the user data, the malicious payload (XSS) triggers, allowing the attacker to capture the admin cookies and access the users' data in plain text.

Recent Exploits: