header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PLC Wireless Router GPN2.4P21-C-CN Unauthenticated Remote Reboot

PLC Wireless Router's are vulnerable to a unauthenticated remote reboot which can be achieved through sending a modified http request. The script below will take a user supplied IP address of a PLC router and send the exploit to the device. Use the Shodan dork above to find PLC wireless routers.

Acunetix Web Vulnerability Scanner 10.0 Build 20150623 – Denial of Service (PoC)

The Acunetix Web Vulnerability Scanner 10.0 Build 20150623 is vulnerable to a denial of service attack. By providing a specially crafted input, an attacker can cause the application to crash, resulting in a denial of service condition.

iSmartViewPro 1.5 – ‘SavePath for ScreenShots’ Local Buffer Overflow

The iSmartViewPro 1.5 software is vulnerable to a local buffer overflow in the 'SavePath for ScreenShots' field. By sending a specially crafted input, an attacker can cause a buffer overflow and potentially execute arbitrary code on the target system.

TP-Link C50 Wireless Router 3 – Cross-Site Request Forgery (Remote Reboot)

This exploit allows an attacker to remotely reboot the TP-Link C50 Wireless Router 3 by sending a forged request. The vulnerability exists in the firmware version <= Build 171227 of the router. By exploiting this vulnerability, an attacker can disrupt the normal functioning of the router.

PHP 5.2.4 ionCube extension safe_mode and disable_functions protections bypass

This exploit allows an attacker to bypass the safe_mode and disable_functions protections of the ionCube extension in PHP 5.2.4. By changing the file path, an attacker can retrieve sensitive information, such as source code and password files. The exploit works on Windows XP Pro SP2 with full patches and can be executed from the command line or Apache server.

Recent Exploits: