header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Boonex Dolphin all versoin <= 7.3 Authentication Bypass

According to PHP documentation strcmp will compare strings, but what if we provide an array??? So, simple bypass is to put two cookies in browser memberID=1 memberPassword[]=blah --->array This will allow the attacker to bypass the authentication and can also enter in admin panel.

Network Scanner Version 4.0.0.0 SEH Based Exploit

Network Scanner Version 4.0.0.0 SEH Based Exploit is a vulnerability that allows an attacker to execute arbitrary code by overflowing the exception handler of the program. This exploit uses a MessageBoxA shellcode and a jump back to the shellcode to trigger the exception handler.

EC-CUBE 2.12.6 Server-Side Request Forgery

This exploit is for EC-CUBE 2.12.6, a Japanese e-commerce platform. The vulnerability is a Server-Side Request Forgery (SSRF) vulnerability which allows an attacker to send a malicious request to a vulnerable server. The exploit uses a fuzzing tool to find the vulnerable endpoint and then sends a POST request with a malicious EndPoint parameter. The malicious request is then sent to the vulnerable server, which then returns the IP address of the attacker.

Orange Inventel LiveBox CSRF

This Router is vulnerable to Cross Site Request Forgery, a hacker can send a well crafted link or well crafted web page to the administrator and thus change the admin password (without the need to know the old one). This affects the other settings too (SSID name, SSID Security, enabling disabling the firewall, etc.).

Zenbership (latest version) – Multiple Vulnerabilities

An attacker can exploit a stored cross-site scripting vulnerability in Zenbership (latest version) by creating a contact form for a guest, entering an XSS payload into the last name input, and then running the payload when the admin views the contact page.

TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit

InterScan Web Security is a software virtual appliance that dynamically protects against the ever-growing flood of web threats at the Internet gateway. The appliance however is shipped with a vulnerable version of Bash susceptible to shellshock. An attacker can exploit this vulnerability by calling the CGI shellscript "/cgi-bin/cgiCmdNotify" which can be exploited to perform arbitrary code execution. A limitation of this vulnerability is that the attacker must have credentials for the admin web interface to exploit this flaw. The panel runs over HTTP by default so a man-in-the-middle attack could be used to gain credentials and compromise the appliance.

Recent Exploits: