header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

All-Dynamics Digital Signage System 2.0.2 – Cross-Site Request Forgery (Add Admin)

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.

CodeMeter 6.60 – ‘CodeMeter.exe’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

QlikView 12.50.20000.0 – ‘FTP Server Address’ Denial of Service (PoC)

This exploit allows an attacker to crash the QlikView 12.50.20000.0 software by sending a specially crafted FTP server address. By pasting a large buffer of 'A' characters into the 'FTP Server Address' field, the software crashes, resulting in a denial of service.

RTSP for iOS 1.0 – ‘IP Address’ Denial of Service (PoC)

The RTSP for iOS 1.0 application is vulnerable to a denial of service (DoS) attack. By sending a specially crafted request, an attacker can cause the application to crash, resulting in a denial of service condition. The vulnerability exists in the 'IP Address' field of the application. To exploit this vulnerability, an attacker needs to provide a large amount of data (450 bytes) as the value for the 'IP Address' field. This will cause the application to crash when the user interacts with the 'IP Address' field. This proof-of-concept (PoC) code demonstrates the vulnerability by generating a buffer of 450 'A' characters and printing it to the console.

UploadImage v1.0 & UploadScript v1.0 Remote Change Admin Password Exploit

This exploit allows an attacker to remotely change the admin password on a target server running UploadImage v1.0 or UploadScript v1.0. The exploit takes advantage of a vulnerability in the software to bypass authentication and change the admin password. The vulnerability can be exploited by providing a malicious payload to the server.

Recent Exploits: