xistence

71 exploits Active since Jul 1997
CVE-2009-0545 METASPLOIT ruby WORKING POC
ZeroShell <1.0beta11 - Command Injection
cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.
CVE-2015-7858 METASPLOIT ruby WORKING POC
Joomla! <3.4.4 - SQL Injection
SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7297.
CVE-2013-10040 METASPLOIT CRITICAL ruby WORKING POC
ClipBucket <2.6 - RCE
ClipBucket version 2.6 and earlier contains a critical vulnerability in the ofc_upload_image.php script located at /admin_area/charts/ofc-library/. This endpoint allows unauthenticated users to upload arbitrary files, including executable PHP scripts. Once uploaded, the attacker can access the file via a predictable path and trigger remote code execution.
CVSS 9.8
CVE-2015-7387 METASPLOIT ruby WORKING POC
Zohocorp Manageengine Eventlog Analyzer < 10.6 - SQL Injection
ZOHO ManageEngine EventLog Analyzer 10.6 build 10060 and earlier allows remote attackers to bypass intended restrictions and execute arbitrary SQL commands via an allowed query followed by a disallowed one in the query parameter to event/runQuery.do, as demonstrated by "SELECT 1;INSERT INTO." Fixed in Build 11200.
CVE-2015-7766 METASPLOIT ruby WORKING POC
ZOHO ManageEngine OpManager <11.6 - Auth Bypass
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
CVE-2013-5015 METASPLOIT ruby WORKING POC
Symantec Endpoint Protection Manager - SQL Injection
SQL injection vulnerability in the management console in Symantec Endpoint Protection Manager (SEPM) 11.0 before 11.0.7405.1424 and 12.1 before 12.1.4023.4080, and Symantec Protection Center Small Business Edition 12.x before 12.1.4023.4080, allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
CVE-2016-8581 METASPLOIT MEDIUM ruby WORKING POC
AlienVault OSSIM & USM <5.3.2 - XSS
A persistent XSS vulnerability exists in the User-Agent header of the login process of AlienVault OSSIM and USM before 5.3.2 that allows an attacker to steal session IDs of logged in users when the current sessions are viewed by an administrator.
CVSS 6.1
CVE-2014-125124 METASPLOIT ruby WORKING POC
Pandora FMS <5.0RC1 - RCE
An unauthenticated remote command execution vulnerability exists in Pandora FMS versions up to and including 5.0RC1 via the Anyterm web interface, which listens on TCP port 8023. The anyterm-module endpoint accepts unsanitized user input via the p parameter and directly injects it into a shell command, allowing arbitrary command execution as the pandora user. In certain versions (notably 4.1 and 5.0RC1), the pandora user can elevate privileges to root without a password using a chain involving the artica user account. This account is typically installed without a password and is configured to run sudo without authentication. Therefore, full system compromise is possible without any credentials.
CVE-2013-10043 METASPLOIT ruby WORKING POC
OAstium VoIP PBX astium-confweb-2.1-25399 - Auth Bypass & RCE
A vulnerability exists in OAstium VoIP PBX astium-confweb-2.1-25399 and earlier, where improper input validation in the logon.php script allows an attacker to bypass authentication via SQL injection. Once authenticated as an administrator, the attacker can upload arbitrary PHP code through the importcompany field in import.php, resulting in remote code execution. The malicious payload is injected into /usr/local/astium/web/php/config.php and executed with root privileges by triggering a configuration reload via sudo /sbin/service astcfgd reload. Successful exploitation leads to full system compromise.
CVE-2013-5014 EXPLOITDB ruby WORKING POC
Symantec Endpoint Protection Manager - XXE
The management console in Symantec Endpoint Protection Manager (SEPM) 11.0 before 11.0.7405.1424 and 12.1 before 12.1.4023.4080, and Symantec Protection Center Small Business Edition 12.x before 12.1.4023.4080, allows remote attackers to read arbitrary files via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
EIP-2026-118759 EXPLOITDB ruby WORKING POC
ManageEngine Security Manager Plus 5.5 build 5505 - Remote SYSTEM SQL Injection (Metasploit)
CVE-2015-7387 EXPLOITDB ruby WORKING POC
Zohocorp Manageengine Eventlog Analyzer < 10.6 - SQL Injection
ZOHO ManageEngine EventLog Analyzer 10.6 build 10060 and earlier allows remote attackers to bypass intended restrictions and execute arbitrary SQL commands via an allowed query followed by a disallowed one in the query parameter to event/runQuery.do, as demonstrated by "SELECT 1;INSERT INTO." Fixed in Build 11200.
EIP-2026-114804 EXPLOITDB ruby WORKING POC
Quantum vmPRO - Backdoor Command (Metasploit)
EIP-2026-114803 EXPLOITDB text WRITEUP
Quantum DXi V1000 2.2.1 - Static SSH Key
EIP-2026-114789 EXPLOITDB text WORKING POC
Loadbalancer.org Enterprise VA 7.5.2 - Static SSH Key
CVE-2014-1903 EXPLOITDB ruby WORKING POC
FreePBX <2.9.0.14, <2.10.1.15, <2.11.0.23, <12.0.1alpha22 - RCE
admin/libraries/view.functions.php in FreePBX 2.9 before 2.9.0.14, 2.10 before 2.10.1.15, 2.11 before 2.11.0.23, and 12 before 12.0.1alpha22 does not restrict the set of functions accessible to the API handler, which allows remote attackers to execute arbitrary PHP code via the function and args parameters to admin/config.php.
EIP-2026-113394 EXPLOITDB text WORKING POC
Western Digital Arkeia Appliance 10.0.10 - Multiple Vulnerabilities
EIP-2026-110458 EXPLOITDB text WORKING POC
Pandora Fms 5.0RC1 - Remote Command Injection
CVE-2014-100002 EXPLOITDB text WORKING POC
Zohocorp Manageengine Supportcenter Plus < 7.9 - Path Traversal
Directory traversal vulnerability in ManageEngine SupportCenter Plus 7.9 before 7917 allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the attach parameter to WorkOrder.do in the file attachment for a new ticket.
EIP-2026-105092 EXPLOITDB text WORKING POC
Alienvault Open Source SIEM (OSSIM) - Multiple Cross-Site Scripting Vulnerabilities
CVE-2015-7858 EXPLOITDB ruby WORKING POC
Joomla! <3.4.4 - SQL Injection
SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7297.
EIP-2026-104880 EXPLOITDB text WORKING POC
Aanval 7.1 build 70151 - Multiple Vulnerabilities
EIP-2026-104784 EXPLOITDB ruby WORKING POC
Western Digital Arkeia < 10.0.10 - Remote Code Execution (Metasploit)
CVE-2008-5191 EXPLOITDB ruby WORKING POC
SePortal 2.4 - SQL Injection
Multiple SQL injection vulnerabilities in SePortal 2.4 allow remote attackers to execute arbitrary SQL commands via the (1) poll_id parameter to poll.php and the (2) sp_id parameter to staticpages.php.
EIP-2026-104711 EXPLOITDB ruby WORKING POC
Alienvault Open Source SIEM (OSSIM) - SQL Injection / Remote Code Execution (Metasploit)