header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Acute Control Panel 1.0.0 RFI/SQL Injection (Auth Bypass)

Acute Control Panel 1.0.0 is vulnerable to Remote File Inclusion and SQL Injection. The vulnerable code is present in container.php and header.php for Remote File Inclusion and login.php for SQL Injection. The PoC for Remote File Inclusion is http://127.0.0.1/themes/container.php?theme_directory=[Shell]%00 and http://127.0.0.1/themes/header.php?theme_directory=[Shell]%00. The PoC for SQL Injection is Username : admin ' or ' 1=1 and Password : anything or nothing.

PHPizabi v0.848b C1 HFP1-3 Remote Arbitrary File Upload Exploit

PHPizabi is prone to a vulnerability that lets remote attackers to upload and execute arbitrary script code. The uploaded file is saved into "/system/cache/temp/" directory and the filename has the form xxx_filename.ext, where xxx is a random number between 1 and 999. If directory listing isn't denied the attacker does not need to know the actual filename (this poc works only in this case), otherwise there are various ways to retrieve the filename, e.g. with this script: $chunk = range(1, 999); shuffle($chunk); $packet = "GET {$path}system/cache/temp/%d_filename.ext HTTP/1.0rn"; $packet .= "Host: {$host}rn"; $packet .= "Connection: closernrn"; foreach ($chunk as $num) { $fp = fsockopen($host, 80); fputs($fp, sprintf($packet, $num)); if (strpos(fread($fp, 1024), "200 OK") !== false) { echo "Filename: {$num}_filename.extn"; break; } fclose($fp); }

IncrediMail Xe (latest version) XSS Vulnerability

The most of popular Mail Client now exclude Script Code for mail content. It aims to avoid the type of XSS exploitation (For e.g: stolen cookie). IncrediMail also remove Script Code when the user read mail. However, I found the "Reply" and "Forward" function of the mail client has not handled mail content well resulting in XSS vulnerability.

Femitter Server FTP 1.x Multiple Vulnerability

The vulnerability is caused due to an input validation error when processing FTP requests. This can be exploited to read, modify, or delete arbitrary files from the affected system via directory traversal attacks. The vulnerability is also caused due to an error in handling the RETR command. This can be exploited to crash the FTP service by sending the 'RETR' command without sending the 'PORT' command.

Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500

This exploit allows attackers to gain remote access to a vulnerable system by exploiting a vulnerability in Adobe Acrobat Reader. The vulnerability is caused due to a boundary error in the handling of JBIG2 streams within the PDF documents. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted PDF file. Successful exploitation allows execution of arbitrary code.

PHPizabi v0.848b C1 HFP1 proc.inc.php remote privilege escalation (php.ini independent)

A SQL injection vulnerability exists in the /theme/default/proc.inc.php file of PHPizabi v0.848b C1 HFP1. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to an authenticated user. This URL contains a malicious SQL query which can be used to change the username and password of an existing user, grant the attacker admin rights, and execute arbitrary code on the vulnerable system.

Recent Exploits: