header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RUNCMS 1.6 Blind SQL Injection Exploit + IDS evasion

This exploit allows an attacker to inject SQL code in various modules of RUNCMS 1.6, including mydownloads/brokenfile.php, mydownloads/visit.php, mydownloads/ratefile.php, mylinks/ratelink.php, and mylinks/modlink.php. By exploiting this vulnerability, the attacker can retrieve the hash of the admin password.

Digi AnywhereUSB 14 – Reflective Cross-Site Scripting

The Digi AnywhereUSB 14 device is vulnerable to a reflective cross-site scripting (XSS) attack. By sending a specially crafted GET request, an attacker can inject and execute malicious script code on the target system, potentially leading to unauthorized access or data theft.

Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 – Stack Overflow (SEH)

The exploit allows an attacker to execute arbitrary code by exploiting a stack overflow vulnerability in Allok RM RMVB to AVI MPEG DVD Converter version 3.6.1217. By pasting the contents of poc_seh.txt into the License Name input field, an attacker can execute the calc.exe application.

eSyndiCat Link Exchange Script – Remote SQL Injection Advisory

An attacker can break the database through the browser by exploiting a SQL injection vulnerability in the suggest-link.php file of the eSyndiCat Link Exchange Script. By injecting a specially crafted SQL query, the attacker can retrieve sensitive information from the database, such as usernames and passwords.

Exploiting Citrix Directory Traversal Bug

This script exploits the Citrix Directory Traversal Bug (CVE-2019-19781) by writing a file through the traversal issue and the newbm.pl script. The file location will be in /netscaler/portal/templates/filename.xml. The payload stub used in this exploit is a Python one-liner that creates a reverse shell using netcat. The payload is encoded and passed as an argument to the readpipe function in the template.new block, allowing for remote command execution on the vulnerable system.

ASTPP 4.0.1 VoIP Billing – Database Backup Download

When administrator performs a ASTPP backup in web interface (Configuration / Database Restore / Create) the file name follows a semi-predictable pattern located in /var/www/html/astpp/database_backup/. The file name can be FUZZED for data exfiltration with the following pattern: astpp_20200110080136.sql.gz

Recent Exploits: