header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TorrentTrader Classic Mutiple Remote vulnerabilities

This vulnerability allows for local file inclusion and cross-site scripting (XSS) attacks. The first vulnerability can be exploited by accessing the backend/admin-functions.php file with a malicious ss_uri parameter. The second vulnerability can be exploited by accessing the pjirc/css.php or browse.php files with a malicious color or cat parameter respectively. These vulnerabilities can be used to execute arbitrary code or steal sensitive information from the affected system.

HID discoveryd command_blink_on Unauthenticated RCE

This module exploits an unauthenticated remote command execution vulnerability in the discoveryd service exposed by HID VertX and Edge door controllers. The vulnerability allows an attacker to execute arbitrary commands on the target system. This module was tested successfully on a HID Edge model EH400 with firmware version 2.3.1.603 (Build 04/23/2012).

HP VAN SDN Controller Root Command Injection

This module exploits a hardcoded service token or default credentials in HPE VAN SDN Controller <= 2.7.18.0503 to execute a payload as root. A root command injection was discovered in the uninstall action's name parameter, obviating the need to use sudo for privilege escalation. If the service token option TOKEN is blank, USERNAME and PASSWORD will be used for authentication. An additional login request will be sent.

wzdftpd <= 0.8.0 (USER) Remote Denial of Service

The wzdftpd 0.8.0 (USER) Remote Denial of Service vulnerability allows remote attackers to cause a denial of service (DoS) by sending a specially crafted USER command to the vulnerable server. This can result in an access violation, causing the server to crash.

Boxoft WAV to MP3 Converter v1.1 Buffer Overflow

This module exploits a stack buffer overflow in Boxoft WAV to MP3 Converter versions 1.0 and 1.1. By constructing a specially crafted WAV file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode.

Recent Exploits: