header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OCS Inventory NG 2.7 – Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a vulnerable OCS Inventory NG 2.7 server. The vulnerability exists in the admin_conf function, which can be abused to inject a payload that will execute a command on the server. By exploiting this vulnerability, an attacker can gain remote code execution privileges on the server.

ZenTao Pro 8.8.2 – Command Injection

This exploit allows an attacker to execute arbitrary commands on the target system by injecting malicious commands into the 'name' parameter of the create_repo function in ZenTao Pro version 8.8.2. By manipulating the 'name' parameter, an attacker can execute commands with the privileges of the web server user.

KiteService 1.2020.618.0 – Unquoted Service Path

A successful attempt would require the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

Code Blocks 20.03 – Denial Of Service (PoC)

The Code Blocks software version 20.03 is vulnerable to a Denial of Service (DoS) attack. By providing a large payload, the software crashes when attempting to search for symbols in the 'Management' section. This can be exploited by an attacker to disrupt the functionality of the software.

Online Student Enrollment System 1.0 – Unauthenticated Arbitrary File Upload

Online Student Enrollment System version 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously crafted PHP file.

OpenCTI 3.3.1 – Directory Traversal

The OpenCTI 3.3.1 version is vulnerable to directory traversal. This vulnerability allows an attacker to access arbitrary files on the server by manipulating the 'TARGET/static/css/' parameter in a GET request. By using a payload like '../../../../../../../../etc/passwd', an attacker can retrieve sensitive information such as the password file.

Recent Exploits: