header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Liferay CE Portal 6.0.2 – Remote Command Execution

A vulnerability in Liferay CE Portal 6.0.2 allows an attacker to execute arbitrary commands on the target system. The vulnerability exists due to improper validation of user-supplied input in the application. An attacker can exploit this vulnerability by sending a specially crafted payload to the application. This will allow the attacker to execute arbitrary commands on the target system.

Kibana 6.6.1 – CSV Injection

Kibana is an open source data visualization dashboard for Elasticsearch. It provides visualization capabilities on top of the content indexed on an Elasticsearch cluster. Most of the kibana applications are having authentication disabled any malicious user can inject csv payload in visualization section of dashboard and It's possible to run malicious command on logged in user computer.

Centreon 19.10.5 – Remote Command Execution

It is possible to call binaries not only in default $USER$ path by adding Poller's Resources. By adding two entries it is possible to trigger a download exec reverse shell. Note, your reverse shell is persistent because Centreon execute your payloads all 10 minutes by default.

BlueGate Remote Code Execution Vulnerability

A vulnerability in BlueGate allows a remote attacker to execute arbitrary code on the target system. The vulnerability exists due to a lack of proper validation of user-supplied input when handling UDP packets. An attacker can send a specially crafted packet to the target system, which will cause a buffer overflow and allow the attacker to execute arbitrary code on the target system.

OLK Web Store 2020 – Cross-Site Request Forgery

This exploit allows an attacker to perform a Cross-Site Request Forgery (CSRF) attack against the OLK Web Store 2020. The attacker can craft a malicious request to the login page of the OLK Web Store 2020, which will then be executed by the victim's browser. The malicious request will contain the attacker's credentials, which will be used to authenticate the attacker and gain access to the OLK Web Store 2020.

Recent Exploits: