header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Request Forgery, Cross-Site Scripting and SQL Injection in CP Contact Form with Paypal WordPress Plugin v1.1.5

The forms in the admin area of the plugin allows CSRF. This gives the capacity for the attacker to add new forms, modify existing form settings, launch XSS attacks, export CSV files of the messages, delete forms, and perform SQL Injection.

Vulnerability in ZenPhoto

There are multiple second order error based SQL injections into the ORDER BY keyword in the admin area. The payload must first be HTML entity-encoded, and then URL encoded. An admin user can execute any function they want via this URL (there is no CSRF protection). For an admin, it is possible to view and edit any PHP or inc files, not just the ones inside the theme directory.

Western Digital Arkeia Remote Code Execution

This module exploits a code execution flaw in Western Digital Arkeia version 11.0.12 and below. The vulnerability exists in the 'arkeiad' daemon listening on TCP port 617. Because there are insufficient checks on the authentication of all clients, this can be bypassed. Using the ARKFS_EXEC_CMD operation it's possible to execute arbitrary commands with root or SYSTEM privileges. The daemon is installed on both the Arkeia server as well on all the backup clients. The module has been successfully tested on Windows, Linux, OSX, FreeBSD and OpenBSD.

Adobe Flash opaqueBackground Use After Free

This module exploits an use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data leak, was described as an Use After Free while handling the opaqueBackground property 7 setter of the flash.display.DisplayObject class. This module is an early release tested on Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.203, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.194, Windows 7 SP1 (32-bit), IE9 and Adobe Flash Flash 18.0.0.203, Windows 7 SP1 (32-bit), Firefox + Adobe Flash 18.0.0.194, windows 8.1, Firefox and Adobe Flash 18.0.0.203, Windows 8.1, Firefox and Adobe Flash 18.0.0.160, and Windows 8.1, Firefox and Adobe Flash 18.0.0.194.

Accellion FTA getStatus verify_oauth_token Command Execution

This module exploits a metacharacter shell injection vulnerability in the Accellion File Transfer appliance. This vulnerability is triggered when a user-provided 'oauth_token' is passed into a system() call within a mod_perl handler. This module exploits the '/tws/getStatus' endpoint. Other vulnerable handlers include '/seos/find.api', '/seos/put.api', and /seos/mput.api'. This issue was confirmed on version FTA_9_11_200, but may apply to previous versions as well. This issue was fixed in software update FTA_9_11_210.

Arabportal 3 SQL injection vulnerability

The Arabportal 3 registeration section is vulnerable to an error based SQL injection attack. The POST parameter 'showemail' is vulnerable to the attack. An example of the attack is 1' AND (SELECT 1212 FROM(SELECT COUNT(*),CONCAT(version(),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.tables GROUP BY x)a) AND 'ali-ahmady'='ali-ahmady

CSRF, Unrestricted File Upload, Privilege escalation & XSS

We can add arbitrary users to the system, delete arbitrary web server files and escalate privileges, as no CSRF token is present. Under users area in admin we can easily gain admin privileges, again using CSRF vulnerability we submit form using our id and change request variable to type '1' granting us admin privileges. The following request parameters are all we is need to delete files from media or files directorys under the web servers CMS area. We can steal PHP session cookie via XSS vulnerability. We can upload malicious files to the web server, as no file type restrictions are present.

Recent Exploits: