header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IBM Tealeaf CX (v8 release 8) Remote OS Command Injection

This exploit allows an attacker to execute arbitrary OS commands on IBM Tealeaf CX (v8 release 8) without authentication. The exploit is triggered by sending a specially crafted POST request to the delivery.php page. The POST request contains a parameter called 'testconn_host' which is used to execute the arbitrary OS command. The exploit also allows an attacker to access the /download.php?log=../../etc/passwd page, which can be used to gain access to the system's password file.

Allied Telesis AT-RG634A ADSL Broadband router hidden administrative unauthenticated webshell.

The Allied Telesis AT-RG634A ADSL Broadband router has a hidden URL (/cli.html) page to execute CLI command with admin priviledges, available by default and without any kind of authentication. Having as impact a total comproise of the device, an attacker can execute arbitrary commands as admin, and even gain access to the configuration file of the device.

VirusChaser 8.0 – Stack Buffer Overflow

VirusChaser 8.0 is vulnerable to a stack buffer overflow vulnerability. An attacker can exploit this vulnerability by sending a specially crafted payload to the scanner.exe application. The payload contains shellcode that is executed when the application attempts to process the malicious input. The shellcode is responsible for executing the WinExec() function, which can be used to execute arbitrary code.

OpenCart <= 1.5.6.1 SQL Injection

OpenCart suffers from multiple SQL injection vulnerabilities in ebay.php, which is more about privilege escalation as attackers may need openbay module access. Poorly coded file full of SQLi opencart/system/library/ebay.php, where product_id is used in a SQL query without being sanitized. The function is called on many locations and parameter is passed without sanitizing. In opencart/admin/controller/openbay/openbay.php, public function editLoad() is vulnerable, where $this->request->get['product_id'] is coming from GET field. Similarly, public function isEbayOrder($id) and public function getProductStockLevel($productId, $sku = '') are also vulnerable.

Katello (Red Hat Satellite) users/update_roles Missing Authorization

This module exploits a missing authorization vulnerability in the 'update_roles' action of 'users' controller of Katello and Red Hat Satellite (Katello 1.5.0-14 and earlier) by changing the specified account to an administrator account.

qEngine CMS 6.0.0 Database Backup Disclosure Exploit

qEngine CMS stores database backups using the Backup DB tool with a predictable file name inside the '/admin/backup' directory as 'Full Backup YYYYMMDD.sql' or 'Full Backup YYYYMMDD.gz', which can be exploited to disclose sensitive information by downloading the file. The '/admin/backup' is also vulnerable to directory listing by default.

Recent Exploits: