header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Arbitrary Modify Configuration File

EasyPHP is a WAMP software bundle that installs web server services onto the Windows computer and allows quick-and-easy development of PHP and MySQL on a localhost (also known as 127.0.0.1). The package includes an Apache server, a MySQL database, and the PHP extension. A slight look on i18n.inc reveals that EasyPHP does not verify user Input ( Lang parameter ) wich leads to arbitrary overwrite EasyPHP configuration file (EasyPHP.ini). The request http://localhost/index.php?lang=fr%00Lang=Overwritten results in overwriting EasyPHP.ini Adding the string "Lang=Overwritten".

openWYSIWYG <= 1.4.7 Local Directory Transversal Vulnerability

A vulnerability in openWYSIWYG <= 1.4.7 allows an attacker to traverse directories outside of the intended directory. This can be exploited by sending a specially crafted HTTP request to the vulnerable server, such as http://[target]/[path]/addons/imagelibrary/select_image.php?dir=../../../

Local Directory Traversal/bypass/shell upload

A vulnerability exists in Dacio_imgGal-v1.6, which allows an attacker to bypass authentication and upload a malicious shell. This is done by accessing the index.php page with the parameter 'gallery' set to '../config.inc%00'. The attacker can then access the admin.php page and add an image, which can be used to upload a malicious shell. The shell can be accessed at '/images/beauty_1/shell.php' or '/images/aa/shell.php' if the beauty_1 directory is deleted. The dork used to find vulnerable sites is 'intitle:"Dacio's Image Gallery"'.

eggBlog <= 4.1.1 Local Directory Transversal Exploit

eggBlog contains one flaw that allows an attacker to carry out a local directory transversal attack. The issue is due to 'select_image.php' script not properly sanitizing user input supplied to the 'dir' GET variable. Note: you may upload image files with double ext on _lib/openwysiwyg/addons/imagelibrary/insert_image.php

Mortbay Jetty <= 7.0.0-pre5 Dispatcher Servlet DoS

The dispatcher servlet (com.acme.DispatchServlet) is prone to a DoS vulnerability. This example servlet is meant to be used as a resources dispatcher, however a malicious aggressor may abuse this functionality in order to cause a recursive inclusion. In detail, it is possible to abuse the method com.acme.DispatchServlet.doGet(DispatchServlet.java:203) forcing the application to recursively include the "DispatchServlet". As a result, it is possible to trigger a "java.lang.StackOverflowError" and consequently an internal server error (500). Multiple requests may easily affect the availability of the entire servlet container.

Recent Exploits: