header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SiAdmin 1.1 – ‘id’ SQL Injection

The SiAdmin 1.1 application is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP GET request to the target server. This allows the attacker to execute arbitrary SQL queries and potentially gain unauthorized access to the database.

Zint Barcode Generator 2.6 – Denial of Service (PoC)

The Zint Barcode Generator version 2.6 is vulnerable to a denial of service (DoS) attack. By sending a specially crafted request, an attacker can cause the application to crash, resulting in a denial of service condition.

Loadbalancer.org Enterprise VA MAX 8.3.2 – Remote Code Execution

Loadbalancer.org Enterprise VA MAX - Remote Code Execution via Unauthenticated Stored XSS. Two instances of Stored XSS were found - exploit uses both. It is possible to inject custom JavaScript code during authentication to /lbadmin/. Application takes input from Basic Auth (username) and stores it without encoding/sanitization/filtering in Apache Error Log. This instance only forks for HTTPS. It is also possible to inject custom JavaScript code by accessing URL like /?<XSS>. Such JavaScript is stored in Apache User Log. This way attacker can store JavaScript code that can for example execute system command as root. This is actually what this exploit does - spawns reverse shell. When application user browses Apache Error Log or Apache User Log custom JavaScript code gets automatically executed.

Nutanix AOS & Prism – SFTP Authentication Bypass

The Acropolis SFTP server doesn't check if the client has completed the authentication step before allowing the client to open channels. This allows an attacker to list the root directory without authenticating.

Any Sound Recorder 2.93 Buffer Overflow (SEH)

This module exploits a stack based buffer overflow in Any Sound Recorder 2.93, when with the name "hack.txt". Copy the content of the "hack.txt", Start Any Sound Recorder 2.93 click "Enter Key Code" Paste the content into field "User Name" click "Register"

IBM Tivoli Storage Manager Express CAD Service Buffer Overflow (5.3)

This exploit allows an attacker to execute arbitrary code on a target system by sending a specially crafted buffer to the IBM Tivoli Storage Manager Express CAD Service. The buffer overflow vulnerability exists in version 5.3 of the software. The exploit code provided in the script connects to a target host and sends the malicious buffer. If successful, it opens a bindshell on port 4444 for the attacker to gain remote access to the system. The script was tested on a Windows 2003 server SP0.

Recent Exploits: