header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MS09_050

This exploit is a python script which uses the SMBv2 protocol to inject a malicious payload into the target system. The payload is a reverse TCP shell which connects back to the attacker's machine. The exploit first sends a packet containing the payload to the target system, and then triggers the payload by attempting to authenticate with the target system.

LFI Flaw in tcpbx voip distro

The software suffer from LFI flaw because of the tcpbx_lang parameter isn't sanitized before being proceeded in the file. An attacker can exploit this vulnerability by sending a crafted HTTP request with the tcpbx_lang parameter set to a malicious file path. This will allow the attacker to read the content of the file.

Multiple MESSOA IP-Cameras auth bypass admin user/password changer

This exploit allows an attacker to bypass authentication and change the admin user/password of MESSOA IP-Cameras. The exploit is written in bash and uses the libwww-perl library to send a GET request to the target IP-Camera. The exploit was tested on MESSOA NIC 835 Release: X.2.1.8, MESSOA NIC 835-HN5 Release: X.2.1.17, MESSOA NIC 836 Release: X.2.1.7, and MESSOA NDZ 860 Release: X.3.0.6.1.

TOPSEC Firewalls – Remote Code Execution (ELIGIBLECANDIDATE)

The vulnerability exists in the TOPSEC Firewalls, which allows an unauthenticated attacker to execute arbitrary code remotely. This is due to the ELIGIBLECANDIDATE parameter not being properly sanitized before being used in a system call. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server.

TOPSEC Firewalls – Remote Code Execution (ELIGIBLECONTESTANT)

This exploit allows remote attackers to execute arbitrary code on vulnerable installations of TOPSEC Firewalls. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of ELIGIBLECONTESTANT requests. By sending a specially crafted ELIGIBLECONTESTANT request, an attacker can cause a stack-based buffer overflow, resulting in remote code execution under the context of the application.

Cisco ASA / PIX – Privilege Escalation (EPICBANANA)

The vulnerability exists in Cisco ASA and PIX devices, which allows an attacker to gain privileged access to the device. This exploit is known as EPICBANANA and was released by the Shadow Brokers in August 2016. The exploit is available in the form of a zip file, which can be downloaded from the Exploit Database.

Recent Exploits: