header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Print Spooler Service Impersonation Vulnerability

This module exploits the RPC service impersonation vulnerability detailed in Microsoft Bulletin MS10-061. By making a specific DCE RPC request to the StartDocPrinter procedure, an attacker can impersonate the Printer Spooler service to create a file. The working directory at the time is %SystemRoot%system32. An attacker can specify any file name, including directory traversal or full paths. By sending WritePrinter requests, an attacker can fully control the content of the created file. In order to gain code execution, this module writes an EXE and then (ab)uses the impersonation vulnerability a second time to create a secondary RPC connection to the PIPEATSVC named pipe. We then proceed to create a remote AT job using a blind NetrJobAdd RPC call.

Signed Applet Social Engineering Code Exec

This exploit dynamically creates an applet via the Msf::Exploit::Java mixin, converts it to a .jar file, then signs the .jar with a dynamically created certificate containing values of your choosing. This is presented to the end user via a web page with an applet tag, loading the signed applet. The user's JVM pops a dialog asking if they trust the signed applet and displays the values chosen. Once the user clicks 'accept', the applet executes with full user permissions. The java payload used in this exploit is derived from Stephen Fewer's and HDM's payload created for the CVE-2008-5353 java deserialization exploit.

iPod Touch/iPhone iFileExplorer Free Directory Traversal

This exploit allows an attacker to traverse the directory structure of an iPod Touch/iPhone device running the iFileExplorer application. The exploit is achieved by sending a crafted URL to the device, which allows the attacker to access the AddressBook.sqlitedb file. The attacker can then use SQLite commands to extract the address book information from the device.

COMTREND ADSL Router BTC(VivaCom) CT-5367 C01_R12 Remote Root

A vulnerability in the COMTREND ADSL Router BTC(VivaCom) CT-5367 C01_R12 allows an unauthenticated attacker to gain access to the router's passwords. By sending a GET request to the router's password.cgi page, the attacker can view the router's passwords in plaintext.

php speedy <= 0.5.2 wordpress plugin (admin_container.php) Remote Code Exec Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable system. It is triggered by sending a specially crafted HTTP request to the vulnerable system. The request contains a malicious command that is executed on the vulnerable system.

Limelight Software Ltd (article.php) Sql Injection Vulnerability

A SQL injection vulnerability exists in Limelight Software Ltd's article.php page, which allows an attacker to inject malicious SQL queries into the application. This can be exploited to manipulate the application's database and gain access to sensitive information. The vulnerability is present when user-supplied input is not properly sanitized before being used in an SQL query.

TIOD v1.3.3 for iPhone / iPod touch, Directory Traversal

There is directory traversal vulnerability in the TIOD. Exploit Testing involves connecting to the server via FTP and using the 'dir' and 'get' commands to traverse the directory structure and retrieve the 'passwd' file.

Recent Exploits: