header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Polar Helpdesk Cookie Based Authentication Bypass

The authentication and privilege system for Polar Helpdesk is based entirely on the values read from a cookie that is saved on the client system. An attacker may modify values in the appropriate cookie to gain administrative access to the affected software. The provided Perl script demonstrates how to exploit this vulnerability by grabbing user lists, grabbing users' email, and listing all available Inbox tickets with charge and credit card information.

LBE Web HelpDesk SQL Injection Vulnerability

LBE Web HelpDesk is reported susceptible to an SQL injection vulnerability. This issue is due to improper sanitization of user-supplied data. This issue may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.

TESO BSD chpass exploit

This exploit is for the TESO BSD chpass vulnerability. It allows an attacker to execute arbitrary code with root privileges on vulnerable systems. The exploit works by exploiting a buffer overflow in the chpass utility, which is used to change user passwords on BSD-based operating systems. By sending a specially crafted input, an attacker can overwrite important memory addresses and gain control of the system. This exploit is written in C and includes shellcode for both OpenBSD and FreeBSD systems.

SQL Injection Vulnerability in DNA HelpDesk

An SQL injection vulnerability is identified in the application that may allow attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. This vulnerability exists due to insufficient sanitization of user-supplied input through the 'where' parameter of 'problist.asp' script. Successful exploitation could result in compromise of the application, disclosure or modification of data or may permit an attacker to exploit vulnerabilities in the underlying database implementation. An attacker may gain access to the administrative username and password and execute arbitrary database commands as well.

MMDF Multiple Vulnerabilities

The SCO Multi-channel Memorandum Distribution Facility (MMDF) is affected by multiple vulnerabilities. These vulnerabilities are due to a failure of the utility to properly validate buffer boundaries when copying user-supplied input. An attacker can exploit these vulnerabilities to execute arbitrary code or crash the affected utility.

Recent Exploits: