header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mulesoft ESB Runtime 3.5.1 Authenticated Privilege Escalation ? Remote Code Execution

Mulesoft ESB Runtime 3.5.1 allows any arbitrary authenticated user to create an administrator user due to a lack of permissions check in the handler/securityService.rpc endpoint. The following HTTP request can be made by any authenticated user, even those with a single role of Monitor. This request will create an administrator with all roles with a username of notadmin and a password of notpassword. Many vectors of remote code execution are available to an administrator. Not only can an administrator deploy WAR applications, they can also evaluate arbitrary groovy scripts via the web interface.

WordPress: Webdorado Spider Event Calendar <= 1.4.9 [SQL Injection]

The Webdorado Spider Event Calendar plugin for WordPress version 1.4.9 is vulnerable to SQL Injection. This allows an attacker to execute arbitrary SQL queries, potentially gaining unauthorized access to the database.

SoftSphere DefenseWall FW/IPS Arbitrary Write Privilege Escalation

The exploit allows arbitrary write privilege escalation in SoftSphere DefenseWall FW/IPS. It is discovered by Parvez Anwar. The vulnerability is found in version 3.24 of the software. The driver version is 3.2.3.0 - dwall.sys. The exploit is tested on 32-bit Windows XP SP3. The CVE ID for this vulnerability is CVE-2015-1515. There is no fix available for this vulnerability.

BullGuard Multiple Products Arbitrary Write Privilege Escalation

This vulnerability allows an attacker to escalate privileges by overwriting the HAL dispatch table. By controlling the input buffer, the attacker can overwrite pointers in the table, which can be used to execute arbitrary code or gain elevated privileges. The vulnerability was discovered by Parvez Anwar and affects multiple BullGuard products. The affected versions range from 14.1.285.4 to 15.0.288.1. The vulnerability has a CVE ID of CVE-2014-9642. The vendor has released a fix for this vulnerability, which can be found at the provided URL. The fixed version is 15.0.288.1. The exploit was tested on a 32-bit Windows XP SP3 system. The vulnerability can be mitigated by updating to the fixed version of the software.

AVG Internet Security 2015 Arbitrary Write Privilege Escalation

The AVG Internet Security 2015 software allows an attacker to escalate privileges by overwriting the HAL dispatch table. By controlling the input buffer, the attacker can overwrite static pointers, leading to privilege escalation.

McAfee Data Loss Prevention Endpoint Arbitrary Write Privilege Escalation

This exploit allows an attacker to escalate their privileges and write arbitrary data in McAfee Data Loss Prevention Endpoint. The vulnerability exists in the hdlpctrl.sys driver of the software. By exploiting this vulnerability, an attacker can gain elevated privileges and potentially execute arbitrary code on the target system.

jclassifiedsmanager Multiple Vulnerabilities

The jclassifiedsmanager component is vulnerable to SQL Injection and XSS attacks. The 'id' parameter in the 'displayads' task is not sanitized, allowing an attacker to inject malicious SQL code. The 'view' parameter in the 'displayads' task is also not sanitized, allowing an attacker to inject arbitrary JavaScript code.

ecommercemajor ecommerce CMS SQL Injection and Authentication bypass

ecommercemajor is a php based CMS for ecommerce portal. It is vulnerable to SQL injection in the 'product.php' file where the 'productbycat' parameter is not properly filtered before being used in a SQL query. It is also vulnerable to authentication bypass in the 'index.php' file under the '__admin' directory, where the 'username' and 'password' parameters are not properly filtered before being used in a SQL query.

Remote Code Execution via Unauthorised File upload in Cforms 14.7

This exploit allows an attacker to upload files without authorization and execute remote code on the target system. The vulnerability exists in Cforms version 14.7 and has a CVE ID of 2014-9473. By exploiting this vulnerability, an attacker can upload malicious files and execute arbitrary code on the target system.

WP Pixarbay Images Multiple Vulnerabilities

The WP Pixarbay Images plugin for Wordpress is affected by multiple vulnerabilities, including authentication bypass, arbitrary file upload, path traversal, and cross-site scripting (XSS). An attacker can exploit these vulnerabilities to execute arbitrary code, upload malicious files, and perform cross-site scripting attacks.

Recent Exploits: