Berkan Er

6 exploits Active since Feb 2021
CVE-2021-3378 NOMISEC CRITICAL WORKING POC
Fortilogger < 5.2.0 - Unrestricted File Upload
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
22 stars
CVSS 9.8
CVE-2021-27963 NOMISEC HIGH WORKING POC
SonLogger <6.4.1 - Info Disclosure
SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header.
1 stars
CVSS 8.2
CVE-2021-3378 METASPLOIT CRITICAL ruby WORKING POC
Fortilogger < 5.2.0 - Unrestricted File Upload
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
CVSS 9.8
CVE-2021-3378 EXPLOITDB CRITICAL ruby WORKING POC
Fortilogger < 5.2.0 - Unrestricted File Upload
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
CVSS 9.8
EIP-2026-104446 EXPLOITDB python WORKING POC
Sonlogger 4.2.3.3 - SuperAdmin Account Creation / Information Disclosure
CVE-2021-27964 EXPLOITDB CRITICAL ruby WORKING POC
SonLogger - Arbitrary File Upload
SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An attacker can send a POST request to /Config/SaveUploadedHotspotLogoFile without any authentication or session header. There is no check for the file extension or content of the uploaded file.
CVSS 9.8