header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TP-LINK TL-WR940N/TL-WR941ND buffer overflow remote shell exploit

This exploit is a remote shell exploit for TP-LINK TL-WR940N/TL-WR941ND routers. It uses a buffer overflow vulnerability to gain access to the router. The exploit uses a MD5 hash of the password 'admin' to generate an authorization cookie. It then uses a series of requests to generate a user directory. The exploit then uses a NOP sled and shellcode to gain access to the router. The shellcode is used to connect to an IP address and open a shell.

Ashop Shopping Cart Software – SQL Injection

Ashop Shopping Cart Software is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to access or modify data in the back-end database, compromise the application, access or escalate privileges, or execute arbitrary commands on the operating system.

CARPE (DIEM) ~ CVE-2019-0211

CARPE (DIEM) is an exploit for CVE-2019-0211, which is an Apache Root Privilege Escalation vulnerability. The exploit works by triggering a Use-After-Free (UAF) vulnerability, which allows an attacker to control the size of a string and make in-place edition. The exploit then uses a DateInterval object to read and write the timelib_rel_time structure, which can be used to gain root privileges.

ManageEngine ServiceDesk Plus – 9.3 User enumeration vulnerability

CVE-2019-10273 is a information leakage vulnerability within the ManageEngine ServiceDesk Plus 9.3 software, this vulnerability allows for the enumeration of active users that are registered on the ServiceDesk 9.3 hosted software. Due to a flaw within the way the authentication is handled, an attacked is able to login and verify any active account.

Download Accelerator Plus DAP 10.0.6.0 – SEH Buffer Overflow

A SEH buffer overflow vulnerability exists in Download Accelerator Plus DAP 10.0.6.0. An attacker can exploit this vulnerability by sending a specially crafted file to the vulnerable application. This can allow the attacker to execute arbitrary code in the context of the application.

CentOS Web Panel v0.9.8.793 (Free) and v0.9.8.753 (Pro) – Email Field Stored Cross-Site Scripting Vulnerability

CentOS-WebPanel.com (aka CWP) CentOS Web Panel v0.9.8.793 (Free/Open Source Version) and v0.9.8.753 (Pro) is vulnerable to Stored/Persistent XSS for Admin Email fields on the 'CWP Settings > Edit Settings' screen. By changing the email ID to any XSS Payload and clicking on Save Changes, the XSS Payload will execute.

Exploit Title: Shoretel Connect Multiple Vulnerability

A reflected XSS vulnerability exists in Shoretel Connect versions 18.62.2000.0, 19.45.5101.0, 19.47.9000.0, 19.48.8400.0. An attacker can exploit this vulnerability by sending a malicious URL to the victim. The malicious URL contains a malicious script which will be executed in the victim's browser. The attacker can also hijack the session of the user by exploiting the XSS vulnerability.

Recent Exploits: