header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Saflok KDF Vulnerability

The Saflok KDF vulnerability allows an attacker to derive keys by exploiting a weakness in the key derivation function. This can lead to unauthorized access and compromise of the system. This vulnerability does not have a CVE assigned yet.

TitanNit Web Control 2.01 / Atemio 7600 Root Remote Code Execution

The vulnerability in TitanNit Web Control 2.01 / Atemio 7600 allows an unauthorized attacker to execute system commands with elevated privileges by utilizing the 'getcommand' query in the application, resulting in root access.

Linux-x64 – XOR Encrypted Shellcode for execve() with /bin//sh Argument

The exploit involves creating a new process in Linux x86_64 by utilizing the execve() system call with an argument of /bin//sh. The shellcode is XOR encrypted, with the encrypted value being QWORD size (/bin - //sh). The assembly code uses XOR operations to set up the arguments for execve() and then executes the system call. The C code snippet demonstrates the execution of the shellcode from the stack.

Microsoft Windows PowerShell Single Quote Code Execution and Event Log Bypass

The vulnerability in Microsoft Windows PowerShell allows for code execution bypassing single quotes using the semicolon ';' and ampersand '&' characters in filenames. By exploiting this flaw, arbitrary code execution can be triggered, and the PowerShell event log can be truncated.

Cross Site Scripting (Stored) in GYM Management System

The GYM Management System version 1.0 is vulnerable to stored cross-site scripting (XSS) due to insufficient validation of user-supplied data in the 'lname' field of the profile.php page. An attacker can inject a malicious payload, such as x%22%20onmouseover%3Dalert%28document.cookie%29%20x%3D%22, which will be executed whenever a user accesses the profile.php page, leading to the execution of arbitrary scripts in the context of the user's browser. This vulnerability has been detected by Alperen Yozgat.

Remote Command Execution in elFinder Web file manager Version 2.1.53

The elFinder Web file manager version 2.1.53 allows remote attackers to execute arbitrary commands via an admin panel URL, which can lead to sensitive information disclosure. An attacker can upload a malicious PHP file to the target server and execute system commands, as demonstrated by accessing the /etc/passwd file.

Recent Exploits: