header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WHMCS ( WHMCompleteSolution ) 3.x / 4.x Multiple Vulnerability

WHMCS ( WHMCompleteSolution ) 3.x / 4.x Multiple Vulnerability is a vulnerability that allows an attacker to gain access to sensitive files on the server. In the first exploit, an attacker can use the submitticket.php file to gain access to the boot.ini file by using the step parameter with an unknown value and the templatefile parameter with the path to the boot.ini file. In the second exploit, an attacker can use the downloads.php file to gain access to the boot.ini file by using the action parameter with an unknown value and the templatefile parameter with the path to the boot.ini file. In the third exploit, an attacker can use the reports.php file to gain access to the boot.ini file by using the report parameter with the path to the boot.ini file.

MS11-021 Microsoft Office 2007 Excel .xlb Buffer Overflow

This module exploits a vulnerability found in Excel of Microsoft Office 2007. By supplying a malformed .xlb file, an attacker can control the content (source) of a memcpy routine, and the number of bytes to copy, therefore causing a stack-based buffer overflow. This results aribrary code execution under the context of user the user.

aidiCMS v3.55 (ajax_create_folder.php) Remote Code Execution Exploit

aidiCMS v3.55 is affected by the vulnerability that allows an attacker to execute arbitrary code on the vulnerable system. This is achieved by sending a specially crafted POST request to the ajax_create_folder.php script, which contains a malicious payload that is written to a file called foo.php. The attacker can then execute arbitrary code by sending a specially crafted GET request to the foo.php script, which contains a base64 encoded command in the Cmd header.

WHMCS (clientarea.php) Local File Disclosure

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server with a wrong value in the action parameter and a malicious file path in the templatefile parameter. This will allow the attacker to view the contents of the file specified in the templatefile parameter.

Linux <= 2.6.37-rc1 serial_multiport_struct Info Leak Exploit

This exploit is used to leak information from the Linux kernel version 2.6.37-rc1 serial_multiport_struct. It uses the TIOCGICOUNT ioctl to read the reserved field of the serial_multiport_struct structure and write it to a file. The exploit takes two arguments, the name of the file to write the leaked information to and the size of the reserved field.

Recent Exploits: