header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

LeadTools Raster Dialog File_D Object (LTRDFD14e.DLL v. 14.5.0.44) Remote Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in LeadTools Raster Dialog File_D Object (LTRDFD14e.DLL v. 14.5.0.44). By sending a specially crafted input, an attacker can overflow a buffer and execute arbitrary code on the target system.

Data Protector Encrypted Communications

This proof of concept demonstrates that enabling encrypted control communication on Data Protector agents does not provide any additional security. As it provides no authentication, it is not a viable workaround to prevent the exploitation of well-known Data Protector issues such as cve-2014-2623. This exploit establishes an unauthenticated encrypted communication channel to a Data Protector Agent and uses a well-known unencrypted Data Protector vulnerability to run arbitrary commands on the target.

Ubiquiti airOS Arbitrary File Upload

This module exploits a pre-auth file upload to install a new root user to /etc/passwd and an SSH key to /etc/dropbear/authorized_keys. FYI, /etc/{passwd,dropbear/authorized_keys} will be overwritten. /etc/persistent/rc.poststart will be overwritten if PERSIST_ETC is true. This method is used by the "mf" malware infecting these devices.

IE 6 / Dart Communications PowerTCP ZIP Compression Control (DartZip.dll 1.8.5.3) remote buffer overflow exploit / xp sp2 it

This is a remote buffer overflow exploit targeting the Dart Communications PowerTCP ZIP Compression Control (DartZip.dll 1.8.5.3) in IE 6 on Windows XP SP2. The exploit allows an attacker to add a user 'sun' with the password 'tzu'. The shellcode used is a Metasploit one.

CVE-2016-4010 Magento unauthenticated arbitrary unserialize -> arbitrary write file

This exploit allows an attacker to perform arbitrary unserialize and arbitrary write file operations in Magento versions below 2.0.6. By exploiting a vulnerability in the Magento framework, an attacker can execute arbitrary code and potentially take control of the system.

Recent Exploits: