header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pandora 7.0NG – Remote Code Execution

Pandora 7.0NG is vulnerable to a remote code execution vulnerability. An attacker can send a crafted graph request with a malicious ip_src parameter to execute arbitrary code on the vulnerable system. This vulnerability is due to insufficient sanitization of user-supplied input in the ip_src parameter of the graph request. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the vulnerable system.

MSN Password Recovery 1.30 – XML External Entity Injection

An XML External Entity Injection (XXE) vulnerability exists in MSN Password Recovery 1.30. An attacker can exploit this vulnerability by creating a malicious XML file and hosting it on a web server. The attacker can then use the software to open the malicious XML file, which will cause the malicious payload to be executed. This can lead to the disclosure of sensitive information.

JetBrains TeamCity 2018.2.4 – Remote Code Execution

The vulnerability exists in the TeamCity server, which allows an attacker to execute malicious code remotely. The exploit code will connect to the TeamCity server and trigger the vulnerable code. To exploit the vulnerability, the attacker needs to have access to a SMB share that the TeamCity software can read from and that the attacker can write to. The attacker then needs to place a malicious POM in the share, which will be executed by the TeamCity server.

ASTPP VoIP 4.0.1 – Remote Code Execution

ASTPP 4.0.1 VoIP Billing Chained Remote Root is vulnerable to Remote Code Execution. An attacker can inject malicious HTML code in SIP Caller Number, XSS injection in SIP Caller Name, XSS document.cookie evasion, XSS document.cookie grabber, Command Injection, Reverse Shell, Root the system and Looting.

EBBISLAND EBBSHAVE 6100-09-04-1441 – Remote Buffer Overflow

EBBISLAND / EBBSHAVE RPC Buffer Overflow for IBM AIX PPC is a vulnerability that allows an attacker to execute arbitrary code on the target system. The exploit code example requires /usr/bin/bash on the target. The exploit code example takes in 6 arguments: rhost, lhost, lport, gid_base, execl_func, execl_toc. The exploit code builds a packet with a header and body, and sends it to the target system. The body contains the node_length, node_name, uid, gid, gids_len, gids, base_addr, addr_8c, addr_a8, addr_4c, func_addr, toc_addr, and cmd.

Cisco DCNM JBoss 10.4 – Credential Leakage

This exploit allows an attacker to gain access to credentials stored in Cisco DCNM JBoss 10.4. The attacker needs to have a few .jars from a copy of Cisco DCNM to compile and run this code. The attacker can then use the code to access the credentials stored in the system. The code can be compiled by matching the file path ${package}/${class}.java, e.g., com/whatdidibreak/dcnm_expl/Main.java. The attacker can then use the command java -jar PackagedJarFile Victim1IpOrFqdn [victim2 ...] to gain access to the credentials.

Complaint Management System 4.0 – Remote Code Execution

There isn't any file extension control at the 'Register Complaint' section of user panel. An unauthorized user can upload and execute php file. Below basic python script will bypass authentication and execute command on target server.

piSignage 2.6.4 – Directory Traversal

The web application component of piSignage before 2.6.4 allows a remote attacker (authenticated as a low-privilege user) to download arbitrary files from the Raspberry Pi via api/settings/log?file=../ path traversal. In other words, this issue is in the player API for log download.

Recent Exploits: