header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebCalendar <= 1.2.4 Remote Code Execution Exploit

The WebCalendar <= 1.2.4 is vulnerable to remote code execution. The vulnerability exists in the /install/index.php file (CVE-2012-1495). The code at line 726 attempts to open a file for writing, but does not check if the file handle is empty. This allows an attacker to write arbitrary PHP code to the file, resulting in remote code execution.

Claroline <= 1.7.6 "includePath" remote cmmnds xctn

This exploit allows an attacker to execute arbitrary commands on the target system through a remote code inclusion vulnerability in Claroline <= 1.7.6. The vulnerability is due to the insecure handling of user input in the "includePath" parameter, which can be exploited to include arbitrary PHP code from a remote location. By crafting a specially crafted request, an attacker can execute arbitrary commands on the target system.

[waraxe-2012-SA#086] – Local File Inclusion in Invision Power Board 3.3.0

Using unsanitized user submitted data for file operations, attacker must be logged in as valid user, PHP must be < 5.3.4 for null-byte attacks to work. Result: remote file disclosure, php remote code execution.

IBM Tivoli Provisioning Manager Express for Software Distribution Isig.isigCtl.1 ActiveX RunAndUploadFile() Method Overflow

This module exploits a buffer overflow vulnerability in the Isig.isigCtl.1 ActiveX installed with IBM Tivoli Provisioning Manager Express for Software Distribution 4.1.1. The vulnerability is found in the 'RunAndUploadFile' method where the 'OtherFields' parameter with user controlled data is used to build a 'Content-Disposition' header and attach contents in an insecure way which allows to overflow a buffer in the stack.

PlumeCMS <= 1.2.4 Multiple Persistent XSS

PlumeCMS 1.2.4 (and below) is prone to multiple persistent XSS vulnerability due to an improper input sanitization of multiple parameters. The 'u_email' parameter and 'u_realname' parameter are not correctly sanitized before being passed to the server-side script 'manager/users.php' via HTTP POST method. An attacker who is able to change his profile settings could insert malicious code into the 'Email' field within the 'Authors' template, creating a persistent XSS vulnerability for all users/admins who access the Plume's management interface.

Recent Exploits: