header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HP OpenView OmniBack II Command Execution

This module uses a vulnerability in the OpenView Omniback II service to execute arbitrary commands. This vulnerability was discovered by DiGiT and his code was used as the basis for this module. For Microsoft Windows targets, due to module limitations, use the "unix/cmd/generic" payload and set CMD to your command. You can only pass a small amount of characters (4) to the command line on Windows.

SpeechD Local Command Execution Vulnerability

SpeechD, a device-independent layer for speech synthesis under Linux, is vulnerable to a local command execution flaw. This vulnerability allows a local user to pass malicious commands to the /dev/speech device, which can be executed with the privilege level of the speechd user (usually root). An attacker can exploit this vulnerability by injecting malicious commands using the echo command and redirecting the output to /dev/speech.

SimpleServer:WWW Command Execution Vulnerability

A problem with the web server could allow a remote user to execute arbitrary commands, and potentially gain local access to the system. The problem is in the validation of URLs that have been encoded in hex. By encoding an URL in hex, it is possible to bypass any filtering for directory traversal, and execute arbitrary programs on the local system.

Services for Unix 2.0 Telnet Client Command Execution Vulnerability

A vulnerability exists in Services for Unix 2.0 that allows a remote user to execute arbitrary commands on a target machine by crafting a URL with command line parameters to the telnet client. The telnet client initiates the logging of session information, allowing an attacker to write and execute arbitrary commands.

Symantec Web Gateway 5.0.2.8 Command Execution Vulnerability

This module exploits a vulnerability found in Symantec Web Gateway's HTTP service. By injecting PHP code in the access log, it is possible to load it with a directory traversal flaw, which allows remote code execution under the context of 'apache'. Please note that it may take up to several minutes to retrieve access_log, which is about the amount of time required to see a shell back.

Coppermine Photo Gallery <= 1.4.14 picEditor.php Command Execution

This module exploits a vulnerability in the picEditor.php script of Coppermine Photo Gallery. When configured to use the ImageMagick library, the 'quality', 'angle', and 'clipval' parameters are not properly escaped before being passed to the PHP 'exec' command. In order to reach the vulnerable 'exec' call, the input must pass several validation steps. The vulnerabilities actually reside in the following functions: image_processor.php: rotate_image(...), include/imageObjectIM.class.php: imageObject::cropImage(...), include/imageObjectIM.class.php: imageObject::rotateImage(...), include/imageObjectIM.class.php: imageObject::resizeImage(...), include/picmgmt.inc.php: resize_image(...). NOTE: Use of the ImageMagick library is a non-default option. However, a user can specify its use at installation time.

Recent Exploits: