Charlie Eriksen

9 exploits Active since Sep 2013
CVE-2012-10025 EXPLOITDB CRITICAL ruby WORKING POC
ACF <3.5.1 - RCE
The WordPress plugin Advanced Custom Fields (ACF) version 3.5.1 and below contains a remote file inclusion (RFI) vulnerability in core/actions/export.php. When the PHP configuration directive allow_url_include is enabled (default: Off), an unauthenticated attacker can exploit the acf_abspath POST parameter to include and execute arbitrary remote PHP code. This leads to remote code execution under the web server’s context, allowing full compromise of the host.
CVE-2012-10025 METASPLOIT CRITICAL ruby WORKING POC
ACF <3.5.1 - RCE
The WordPress plugin Advanced Custom Fields (ACF) version 3.5.1 and below contains a remote file inclusion (RFI) vulnerability in core/actions/export.php. When the PHP configuration directive allow_url_include is enabled (default: Off), an unauthenticated attacker can exploit the acf_abspath POST parameter to include and execute arbitrary remote PHP code. This leads to remote code execution under the web server’s context, allowing full compromise of the host.
CVE-2013-5036 METASPLOIT ruby WORKING POC
Square Squash - RCE
The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.
CVE-2013-5093 METASPLOIT ruby WORKING POC
Graphite <0.9.10 - RCE
The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
CVE-2012-4915 METASPLOIT ruby WORKING POC
Google Doc Embedder <2.5.4 - Path Traversal
Directory traversal vulnerability in the Google Doc Embedder plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to libs/pdf.php.
CVE-2013-5093 EXPLOITDB ruby WORKING POC
Graphite <0.9.10 - RCE
The renderLocalView function in render/views.py in graphite-web in Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object.
CVE-2012-4915 EXPLOITDB ruby WORKING POC
Google Doc Embedder <2.5.4 - Path Traversal
Directory traversal vulnerability in the Google Doc Embedder plugin before 2.5.4 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter to libs/pdf.php.
EIP-2026-113671 EXPLOITDB text WRITEUP
WordPress Plugin Crayon Syntax Highlighter - 'wp_load' Remote File Inclusion
CVE-2013-5036 EXPLOITDB ruby WORKING POC
Square Squash - RCE
The Square Squash allows remote attackers to execute arbitrary code via a YAML document in the (1) namespace parameter to the deobfuscation function or (2) sourcemap parameter to the sourcemap function in app/controllers/api/v1_controller.rb.