header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Binwalk v2.3.2 – Remote Command Execution (RCE)

Binwalk 2.1.2b through 2.3.2 is vulnerable to a remote command execution vulnerability. An attacker can craft a malicious .png file and send it to the victim, which when opened with Binwalk, will execute arbitrary code on the victim's machine. The exploit is written in Python and uses the netcat utility to open a reverse shell on the victim's machine.

Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB – Information Disclosure

This vulnerability allows an attacker to gain access to sensitive information stored on a vulnerable system. It affects Dell EMC Networking PC5500 firmware versions 4.1.0.22 and Cisco Sx / SMB. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable system. Successful exploitation of this vulnerability can result in the disclosure of sensitive information.

PostgreSQL 9.6.1 – Remote Code Execution (RCE) (Authenticated)

This exploit allows an authenticated user to execute arbitrary system commands on a vulnerable PostgreSQL 9.6.1 instance. The exploit uses a PostgreSQL feature called PL/pgSQL to execute the commands. The exploit requires the user to provide the IP address, port, username and password of the PostgreSQL instance. The user can then provide a system command to be executed on the vulnerable instance.

Online Eyewear Shop 1.0 – SQL Injection (Unauthenticated)

Online Eyewear Shop 1.0 allows Unauthenticated SQL Injection via parameter 'id' in 'oews/?p=products/view_product&id=?' Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

D-Link DIR-846 – Remote Command Execution (RCE) vulnerability

D-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.

Bus Pass Management System 1.0 – Stored Cross-Site Scripting (XSS)

The application permits to send a message to the admin from the section 'contacts'. Including a XSS payload in title or message, maybe also in email bypassing the client side controls, the payload will be executed when the admin will open the message to read it.

Calendar Event Multi View 1.4.07 – Unauthenticated Arbitrary Event Creation to Cross-Site Scripting (XSS)

The Calendar Event Multi View WordPress plugin before 1.4.07 does not have any authorisation and CSRF checks in place when creating an event, and is also lacking sanitisation as well as escaping in some of the event fields. This could allow unauthenticated attackers to create arbitrary events and put Cross-Site Scripting payloads in it.

Kardex Mlog MCC 5.7.12 – RCE (Remote Code Execution)

Kardex Mlog MCC 5.7.12 is vulnerable to Remote Code Execution. An attacker can exploit this vulnerability by uploading a malicious payload to the target system and executing it. The payload contains a reverse shell which can be used to gain access to the target system. The attacker needs to run a netcat listener beforehand to receive the reverse shell.

Recent Exploits: