header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MVPower DVR Shell Unauthenticated Command Execution

This module exploits an unauthenticated remote command execution vulnerability in MVPower digital video recorders. The 'shell' file on the web interface executes arbitrary operating system commands in the query string. This module was tested successfully on a MVPower model TV-7104HE with firmware version 1.8.4 115215B9 (Build 2014/11/17). The TV-7108HE model is also reportedly affected, but untested.

PNphpBB2 “viewforum.php” SQL Injection Blind Password Hash Fishing Exploit

This exploit allows an attacker to perform SQL injection in the 'order' parameter of the 'viewforum.php' file in PNphpBB2 version 1.2i and below. The attacker can inject a subquery to retrieve the user_password hash from the pn_phpb table.

MyCMS Remote Command Execution Exploit

This exploit takes advantage of a vulnerability in the MyCMS admin files, allowing an attacker to execute remote commands on the target server. The vulnerability is caused by a bypassable function that checks for an admin cookie. By putting PHP code in the settings.inc file, which is required in many pages, an attacker can create a shell on the victim site.

MyCMS <= 0.9.8 Remote Command Execution

The vulnerability is located in the hight-scores management files of the game in MyCMS. The code allows for arbitrary code execution by including a file based on user input. This exploit creates a shell on the victim's site. The vulnerability can be exploited by setting the scoreid parameter in the games.php file.

DiskSavvy Enterprise 9.4.18 – Remote buffer overflow – SEH overwrite with WoW64 egghunters

This exploit takes advantage of a remote buffer overflow vulnerability in DiskSavvy Enterprise version 9.4.18. It uses a SEH overwrite technique with WoW64 egghunters to gain remote code execution. The exploit is specifically designed for 64-bit operating systems. It includes a modified version of the original Win7 egghunter and a Win10 WoW64 egghunter. If a WoW64 egghunter is needed for other Windows versions, the author can be contacted through their website.

[PoC] AXIS Camera Control (AxisCamControl.ocx v. 1.0.2.15) “SaveBMP()” Method Buffer Overflow

This exploit targets a buffer overflow vulnerability in the "SaveBMP()" method of AXIS Camera Control (AxisCamControl.ocx v. 1.0.2.15). The vulnerability allows an attacker to execute arbitrary code on vulnerable systems.

AlienVault OSSIM/USM Remote Code Execution

This module exploits object injection, authentication bypass, and IP spoofing vulnerabilities all together. Unauthenticated users can execute arbitrary commands under the context of the root user. By abusing an authentication bypass issue on gauge.php, adversaries can exploit an object injection vulnerability that leads to an SQL injection attack, which leaks an administrator session token. Attackers can create a rogue action and policy that enables them to execute operating system commands using the captured session token. As a final step, an SSH login attempt with invalid credentials can trigger the created rogue policy, which in turn triggers an action that executes an operating system command with root user privileges. This module was tested against the following product and versions: AlienVault USM 5.3.0, 5.2.5, 5.0.0, 4.15.11, 4.5.0 AlienVault OSSIM 5.0.0, 4.6.1

Recent Exploits: