s0nk3y

9 exploits Active since Apr 2017
CVE-2015-6568 EXPLOITDB HIGH ruby WORKING POC
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image. Exploitation requires a registered user who has access to upload functionality.
CVSS 8.8
EIP-2026-118012 EXPLOITDB ruby WORKING POC
Tomabo MP4 Player 3.11.6 - Local Stack Overflow (SEH) (Metasploit)
EIP-2026-117240 EXPLOITDB text WRITEUP
Glassfish Server - Unquoted Service Path Privilege Escalation
EIP-2026-114536 EXPLOITDB html WORKING POC
Yona CMS - Cross-Site Request Forgery
EIP-2026-108667 EXPLOITDB text WORKING POC
Joomla! Component Guru Pro - 'Itemid' SQL Injection
EIP-2026-108499 EXPLOITDB text WORKING POC
Joomla! Component com_publisher - SQL Injection
EIP-2026-107944 EXPLOITDB html WORKING POC
IonizeCMS 1.0.8 - Cross-Site Request Forgery (Add Admin)
EIP-2026-107397 EXPLOITDB text WORKING POC
Getsimple CMS 3.3.10 - Arbitrary File Upload
CVE-2015-6567 EXPLOITDB HIGH ruby WORKING POC
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.
CVSS 8.8