header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nessus Vulnerability Scanner 3.0.6 ActiveX 0day Remote Code Execution Exploit

This exploit allows remote code execution on systems running Nessus Vulnerability Scanner 3.0.6. The bug was discovered by Krystian Kloskowski (h07) and was tested on Nessus 3.0.6 with IE 6 on Windows XP SP2 (Polish). The exploit injects a command to shut down the system with a delay of 1000 milliseconds and displays the message 'hello world ;]'. It then saves a file named 'exec.bat' in a specific directory.

PK5001Z CenturyLink Router/Modem remote root exploit

This exploit allows an attacker to gain remote root access to a PK5001Z CenturyLink Router/Modem. The exploit leverages a vulnerability in the router's firmware to execute arbitrary code and gain root privileges. By sending a specially crafted payload, the attacker can bypass authentication and gain full control over the device.

Seditio CMS Remote File Upload Vulnerability

This exploit allows an attacker to upload malicious files to the Seditio and Ldu CMS websites. The attacker needs to register on the victim's website and then upload the evil script through the 'pfs.php' page. The evil script can be in the form of a .php.gif, .php.jpg, or .php.png file.

FTPGetter 5.89.0.85 Remote SEH Buffer Overflow

There is a buffer overflow in the log viewer/parser of FTPGetter. When a malicious ftp server returns a long 331 response, the overflow overwrites SEH produced is exploitable. There are many bad characters, so I had to ascii encode everything. My PoC runs code to launch a command shell. Also note the time of day is displayed in the log viewer, which will change the length of the buffer needed. Just adjust your sled accordingly.

Recent Exploits: