header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CMS MAXSITE Component Guestbook Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on the vulnerable CMS MAXSITE Component Guestbook. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'name' parameter of the 'guestbook.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP request containing shell metacharacters to the vulnerable script. Successful exploitation of this vulnerability will result in execution of arbitrary commands on the vulnerable system with the privileges of the web server.

Ocean12 Mailing List Manager Gold

The vulnerability exists in the Ocean12 Mailing List Manager Gold application. It is possible to inject malicious SQL and XSS payloads via the 'email' and 'Name' parameters in the 's_edit.asp' and 'default.asp' scripts. It is also possible to download the 'o12mail.mdb' file which contains sensitive information.

E.Z. Poll <= v.2 script Remote SQL injection Exploit

E.Z. Poll <= v.2 script is vulnerable to a Remote SQL injection attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable page http://www.site.com/admin/login.asp with the username and password set to 'or' '=' . This will allow the attacker to gain access to the admin panel and add or modify users via the /admin/admin-users.asp page.

Two buffer overflows in Maxum Rumpus

Rumpus v6.0 contains two buffer overflow vulnerabilities in its HTTP and FTP modules. The first allows an unauthenticated user to crash Rumpus. The later may result in arbitrary code execution under superuser privilege. The overflow in HTTP component is caused by the lack of boundary check when parsing for HTTP action verb (GET, POST, PUT, etc.). If the verb is exactly 2908-byte long, the server runs into a segmentation fault and crashes. The overflow in FTP component is also caused by the lack of length check when parsing FTP commands that take argument such as MKD, XMKD, RMD and so on. The overflow occurs when the argument is strcpy to an internal buffer. This buffer is 1024-byte long. When the passed-in argument is longer than 1046 bytes, the instruction pointer will be overwritten.

Symlink Re-Jiggler

This exploit is a proof of concept for a vulnerability in the Linux kernel. It allows an attacker to gain root access by exploiting a race condition in the kernel's handling of symbolic links. The exploit works by creating a symbolic link to a file that the attacker has write access to, and then repeatedly creating and deleting the link until the kernel assigns the same inode number to the link and the file. The attacker can then use the link to gain access to the file.

Andy’s PHP Knowledgebase Arbitrary File Upload Vulnerability

In saa.php page, you can submit an article and attachment file to wait for approval from admin. Immediately after you submit the article and attachment file, the file has already been on the server without checking file type. You can upload arbitary file through this form and the url to this file is in authors.php page.

Broadcast Machine 0.1 Multiple Remote File Inclusion Vulnerability

Broadcast Machine version 0.1 is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input to the 'baseDir' parameter in multiple files. An attacker can exploit this vulnerability by sending a malicious URL to an unsuspecting user. The malicious URL contains a reference to a file located on a remote server that will be included in the application. This can allow an attacker to execute arbitrary code on the vulnerable system.

Local .EWB File Stack Buffer Overflow (PoC)

A buffer overflow vulnerability exists in Electronics Workbench, which is caused by improper bounds checking of user-supplied data. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is triggered when a specially crafted .EWB file is opened, which causes a stack-based buffer overflow. This can result in arbitrary code execution.

Recent Exploits: