header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebPagetest <= 2.6 Multiple Vulnerabilities

The WebPagetest application is vulnerable to local file disclosure. An attacker can exploit this vulnerability by sending a crafted request to the 'gettext.php' script with a specially crafted 'file' parameter, allowing them to read arbitrary files on the server. The vulnerability exists due to improper input validation in the 'gettext.php' script, where user-supplied input is not properly sanitized. This vulnerability can be exploited by an unauthenticated attacker with network access to the affected system.

FTP Explorer Weak Encryption

FTP Explorer stores profiles of visited FTP sites, including the user's name and weakly encrypted passwords. The encryption algorithm increments each character in the password by 9, then increments it further based on its position in the password. The encryption mechanism is weak and can easily be broken.

Arbitrary Code Execution via Windows Help Files

The help files for the Windows Help system (*.cnt, *.hlp) can be edited so that they run an arbitrary executable when selected by a user. The executable will run at the privilege level of the user. The *.cnt files are like tables of contents that tell the help system what to open when each topic is selected. These entries can be edited to cause system and DLL calls and programs to be executed when a topic is chosen. The help files themselves, *.hlp, can be edited in a similar manner.

Umbraco CMS Remote Command Execution

This module can be used to execute a payload on Umbraco CMS 4.7.0.378. The payload is uploaded as an ASPX script by sending a specially crafted SOAP request to codeEditorSave.asmx, which permits unauthorised file upload via the SaveDLRScript operation. SaveDLRScript is also subject to a path traversal vulnerability, allowing code to be placed into the web-accessible /umbraco/ directory. The module writes, executes and then overwrites an ASPX script; note that though the script content is removed, the file remains on the target. Automatic cleanup of the file is intended if a meterpreter payload is used. This module has been tested successfully on Umbraco CMS 4.7.0.378 on a Windows 7 32-bit SP1. In this scenario, the "IIS APPPOOLASP.NET v4.0" user must have write permissions on the Windows Temp folder.

Local Privilege Escalation in Spooler Service

The spooler service (spoolss.exe) allows local users to add their own dll files and have the spooler run them at SYSTEM level. This could lead to privilege escalation all the way up to Administrator level. The problem is in the function AddPrintProvider(). This exploit will crash the spooler service and copy a custom dll into c:winntsystem32. When the spooler service is restarted, the custom dll is loaded and run at SYTEM level. The 'whoami' binary is run and the results logged in a text file for verification. If the target machine's NT directory is not the default c:winnt, the program will have to be modified.

UCCASS <= v1.8.1 Blind SQL Injection Vulnerability

The UCCASS survey script (version <= 1.8.1) is vulnerable to blind SQL injection. An attacker can exploit this vulnerability by manipulating the 'sid' parameter in the 'filter.php' file. By injecting a specially crafted SQL query, the attacker can bypass authentication or retrieve sensitive information from the database.

LimeSurvey 1.92+ build 120620 Multiple Vulnerabilities

The LimeSurvey version 1.92+ build 120620 is vulnerable to Remote File Inclusion (RFI) and Directory Traversal attacks. In the RFI vulnerability, an attacker can include arbitrary remote files by setting the 'rootdir' parameter to a malicious URL. In the Directory Traversal vulnerability, an attacker can access sensitive files by manipulating the 'sFullFilepath' parameter.

Vulnerability in Floosietek’s FTGate

A vulnerability in Floosietek's FTGate allows remote malicious users to steal local files. The web server fails to check whether requested files fall outside its document tree (by using '..' in the URL). Thus attackers can retrieve files in the same drives as that on which the software resides if they know or can get its filename.

Mrxsmb.sys XP & 2K Ring0 Exploit

This exploit targets the Mrxsmb.sys driver in Windows XP and Windows 2000 to gain ring0 privileges. It disables ReadOnly Memory protection by modifying a specific file offset call. The exploit has been tested on XP SP2 and 2K SP4. This exploit is for educational purposes only.

Recent Exploits: