header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

10-Strike Network Inventory Explorer 8.54 – Local Buffer Overflow (SEH)

The exploit allows for a local buffer overflow in 10-Strike Network Inventory Explorer version 8.54. By opening a malicious text file, an attacker can trigger the overflow and potentially execute arbitrary code.

Windows UAC Protection Bypass (Via Slui File Handler Hijack)

This module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe.The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished.The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process.

Smartshop 1 – Cross site request forgery

This exploit allows an attacker to perform unauthorized actions on behalf of a victim user by tricking them into submitting a malicious form. In this case, the exploit targets the 'editprofile.php' file of the Smartshop software. The form is designed to change the admin password by submitting the email, password, and confirmation fields with predefined values.

PHP Dashboards NEW v5.5 – ‘Login’ SQL Injection

PHP Dashboards is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: