header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress User Role Editor Plugin Privilege Escalation

The WordPress User Role Editor plugin prior to v4.25, is lacking an authorization check within its update user profile functionality. This vulnerability allows an authenticated user to add arbitrary User Role Editor roles to its profile.

Novus – Sistema de administracion y contenido.

The Novus system is vulnerable to SQL Injection. By manipulating the 'nota_id' parameter in the 'notas.asp' page, an attacker can execute arbitrary SQL queries. The following SQL injection payloads can be used to extract sensitive information: - http://[novus]/notas.asp?nota_id=1+and+1=convert(int,db_name()) - http://[novus]/notas.asp?nota_id=1+and+1=convert(int,system_user) - http://[novus]/notas.asp?nota_id=1+and+1=convert(int,@@servername)-- - http://[novus]/notas.asp?nota_id=1+and+1=convert(int,@@version)--

Metasploit msfd Remote Code Execution

Metasploit's msfd-service makes it possible to get a msfconsole-like interface over a TCP socket. If this socket is accessible on a remote interface, an attacker can execute commands on the victim's machine. If msfd is running with higher privileges than the current local user, this module can also be used for privilege escalation. In that case, port forwarding on the compromised host can be used. Code execution is achieved with the msfconsole command: irb -e 'CODE'.

Nagios XI 5.2.[6-9], 5.3, 5.4 Chained Remote Root

This exploit leverages the vulnerabilities enumerated in these CVES: [ CVE-2018-8733, CVE-2018-8734, CVE-2018-8735, CVE-2018-8736 ]. More details here: http://blog.redactedsec.net/exploits/2018/04/26/nagios.html. Steps are as follows: 0. Determine Version 1. Change the database user to root:nagiosxi 2. Get an API key w/ SQLi 3. Use the API Key to add an administrative user 4. Login as that administrative user 5. Do some authenticated RCE w/ privesc 6. Cleanup.

Drupalgeddon3

A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution. The module can load msf PHP arch payloads, using the php/base64 encoder. The resulting RCE on Drupal looks like this: php -r 'eval(base64_decode(#{PAYLOAD}));'

CVE-2017-0781 Bluetooth Stack Overflow Exploit

This exploit takes advantage of a stack overflow vulnerability in the Bluetooth stack. By sending a specially crafted BNEP packet, an attacker can cause a stack overflow and potentially execute arbitrary code on the target device. This vulnerability is identified by CVE-2017-0781.

Recent Exploits: