header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Berta CMS Unauthenticated File Upload Vulnerability

Berta CMS is a web based content management system using PHP and local file storage. Due to use of a 3rd party Berta CMS website to redirect links within a phishing email brought to our attention, we checked the file upload functionality of this software. We found that the file upload didn't require authentication. Images with a '.php' extension could be uploaded, and all that was required is that they pass the PHP getimagesize() function and have suitable dimensions. It is possible for GIF image files (and possibly other image files - not tested) to contain arbitrary PHP whilst being well enough formed to pass the getimagesize() function with acceptable dimensions. The patch requires authentication for all file uploads, which will likely resolve any similar issues.

WebGate Control Center GetThumbnail Stack Overflow SEH Overwrite (0Day)

This exploit is a stack overflow SEH overwrite vulnerability in WebGate Control Center 4.8.7. It is triggered when a maliciously crafted argument is passed to the GetThumbnail function. This causes a buffer overflow which overwrites the SEH handler and allows for arbitrary code execution.

WebGate WinRDS WESPPlayback.WESPPlaybackCtrl.1 StopSiteAllChannel Stack Buffer Overflow Vulnerability (0Day)

A stack buffer overflow vulnerability exists in WebGate WinRDS WESPPlayback.WESPPlaybackCtrl.1 StopSiteAllChannel due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.

Acunetix OLE Automation Array Remote Code Execution

Acunetix Login Sequence Recorder (lsr.exe) Uses CoCreateInstance API From Ole32.dll To Record Target Login Sequence. Exploit Based on MS14-064 CVE2014-6332. This Python Script Will Start A Sample HTTP Server On Your Machine And Serves Exploit Code And Metasploit windows/shell_bind_tcp Executable Payload. And Finally You Can Connect To Victim Machine Using Netcat.

Multiple XSS and CSRF vulnerabilities in pfSense

High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in web interface of pfSense, which can be exploited to perform Cross-Site Scripting (XSS) attacks against administrator of pfSense and delete arbitrary files via CSRF (Cross-Site Request Forgery) attacks. Successful exploitation of the vulnerabilities may allow an attacker to delete arbitrary files on the system with root privileges, steal administrator’s cookies and gain complete control over the web application and even the entire system, as pfSense is running with root privileges and allows OS command execution via its web interface.

WebGate eDVR Manager WESPMonitor.WESPMonitorCtrl LoadImage Stack Buffer Overflow Remote Code Execution (0 day)

A stack buffer overflow vulnerability exists in WebGate eDVR Manager WESPMonitor.WESPMonitorCtrl LoadImage function. An attacker can exploit this vulnerability to execute arbitrary code on the target system by sending a specially crafted request containing an overly long string.

QNAP Web server remote code execution via Bash Environment Variable Code Injection

This module allows you to inject unix command with the same user who runs the http service - admin - directly on the QNAP system. Affected products: All Turbo NAS models except TS-100, TS-101, TS-200.

RM Downloader v2.7.5.400 Local Buffer Overflow

RM Downloader v2.7.5.400 is vulnerable to a local buffer overflow vulnerability. An attacker can exploit this vulnerability by sending a specially crafted RAM file to the application. This will cause a buffer overflow and allow the attacker to execute arbitrary code on the vulnerable system.

Mini-sream Ripper v2.7.7.100 Local Buffer Overflow

Mini-sream Ripper v2.7.7.100 is vulnerable to a local buffer overflow vulnerability. An attacker can exploit this vulnerability by crafting a malicious M3U file and sending it to the victim. When the victim opens the malicious M3U file, a message box will be displayed, allowing the attacker to execute arbitrary code on the victim's system.

Adobe Flash vulnerability source code (cve-2015-0313) from Angler Exploit Kit

This vulnerability is a use-after-free vulnerability in Adobe Flash Player that allows attackers to execute arbitrary code on the target system. The vulnerability was discovered in the Angler Exploit Kit and was used in malvertisements. It affects Adobe Flash Player versions up to 16.0.0.296 and earlier.

Recent Exploits: