header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pandora FMS 7.0NG – ‘net_tools.php’ Remote Code Execution

An authenticated remote code execution vulnerability exists in Pandora FMS 7.0NG in the 'net_tools.php' file. The vulnerability is due to the lack of proper input validation when handling user-supplied data. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable file. This will allow the attacker to execute arbitrary code on the vulnerable system.

Grandstream UCM6200 Series CTI Interface – ‘user_password’ SQL Injection

Grandstream UCM6200 Series CTI Interface is vulnerable to a SQL injection vulnerability in the 'user_password' parameter. An attacker can exploit this vulnerability to gain access to the user's password.

DrayTek pre-auth remote root RCE

A vulnerability in DrayTek Vigor2960, Vigor3900, and Vigor300B routers allows an unauthenticated attacker to execute arbitrary code with root privileges. This vulnerability is due to improper validation of user-supplied input in the web management page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the web management page. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with root privileges.

Windows SMBv3 LPE Exploit

CVE-2020-0796 is a vulnerability in the Microsoft Server Message Block 3.1.1 (SMBv3) protocol which can allow an unauthenticated attacker to execute arbitrary code on the target system. The vulnerability is caused by a memory corruption issue in the SMBv3 protocol, which can be triggered by sending a specially crafted packet to a targeted SMBv3 server. The vulnerability affects Windows 10 version 1903 and 1909, Windows Server version 1903 and 1909, and Windows Server version 2004.

10-Strike Network Inventory Explorer 9.03 – ‘Read from File’ Buffer Overflow (SEH)(ROP)

Exploits the functionality to load a list of computers from a file. Some DLL's and the main EXE don't rebase, which allowed for some instruction reusage for ROP. Used a jump after ROP to go to a buffer for more space.

Joomla! com_fabrik 3.9.11 – Directory Traversal

A directory traversal vulnerability exists in Joomla! com_fabrik 3.9.11 due to insufficient sanitization of user-supplied input in the 'folder' parameter of the 'onAjax_files' function in the 'fabrik_element/image/image.php' script. An attacker can exploit this vulnerability to read arbitrary files from the server.

Recent Exploits: