header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adcycle v0.78b eXploit

Adcycle is a package of perl scripts available from Adcycle.com. The scripts are designed to manage banner ad rotation through a web interface, backended with a MySQL database. A problem with the suite could allow remote execution of commands. The handling of input by the script may allow users to gain access to the accounts of other users that are currently logged in. By generating a custom crafted request and appending it to the adcenter.cgi script, a user would be able to fill the values needed to get access to the system, and execute commands as a user already logged into the system. This makes it possible for a malicious to gain access to database resources and execute arbitrary commands.

Remote Command Execution on Bajie Webserver

A remote user can use Bajie's built-in upload feature to place malicious scripts on Bajie webservers. These uploaded scripts are placed in known destination directories and can be automatically executed. Unfortunately Bajie's CGI processor doesn't verify the CGI program exists before executing the script. Once these files are uploaded, they can be then executed as CGI scripts on the server.

Buffer Overflow Vulnerability in John Roy Pi3Web Web Server

A buffer overflow vulnerability has been reported in John Roy Pi3Web web server. The ISAPI application within the server fails to properly handle user supplied input. Requesting a specially crafted URL will cause the buffer to overflow and possibly allow the execution of arbitrary code. Pi3Web has also been known to disclose the physical path to the web root by requesting an invalid URL.

A specially crafted URL composed of a known filename, will disclose the requested file residing on a machine running WebPALS

WebPALS is vulnerable to a specially crafted URL composed of a known filename, which can be used to disclose the requested file residing on a machine running WebPALS. This vulnerability can also be used to execute arbitrary code with root privileges.

A specially crafted URL composed of a known filename, will disclose the requested file residing on a machine running WebPALS. This vulnerability will also allow an attacker to execute arbitrary code with root privileges.

WebPALS is vulnerable to a specially crafted URL composed of a known filename, which will disclose the requested file residing on a machine running WebPALS. This vulnerability will also allow an attacker to execute arbitrary code with root privileges.

HIS Software Auktion 1.62 Remote File Access Vulnerability

A remote user could gain read access to known files outside of the root directory where HIS Software Auktion 1.62 resides. Requesting a specially crafted URL composed of '../' sequences along with the known filename will disclose the requested file. This vulnerability could also lead to the execution of arbitrary code.

Recent Exploits: