header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apache James Server 2.3.2 Authenticated User Remote Command Execution

This exploit works on default installation of Apache James Server 2.3.2. It allows an authenticated user to execute arbitrary commands on the server. The exploit creates a user with a malicious payload in the /etc/bash_completion.d directory, which is then executed when the user logs in.

Humhub <= 0.10.0-rc.1 multiple persistent XSS vulnerabilities

Humhub [1] social networking kit versions 0.10.0-rc.1 and prior suffer from multiple persistent Cross-Site Scripting vulnerabilities, which have now been resolved in cooperation with the vendor [2], in various parts of the codebase. In the function actionPost() in '/protected/modules_core/post/controllers/PostController.php' [3], the $_POST variable is cleaned using a now-outdated version of the Yii framework's CmsInput extension stripClean() function [4], which improperly sanitizes user-input for XSS [5]. This situation also applies to actionPost() in '/protected/modules_core/comment/controllers/CommentController.php' [6]. Humhub-modules-mail versions 0.5.9 and prior (when used in conjunction with Humhub 0.10.0-rc.1 or prior) is affected by the same vulnerability as described above. The vulnerable code is located in the function actionCreate() in '/controllers/MailController.php' [8]. In addition to the above, the admin error logging codebase is vulnerable to a persistent XSS attack. The vulnerable code is located in the function actionView() in '/protected/modules_core/admin/controllers/LoggingController.php' [9].

IceHrm <=7.1 Multiple Vulnerabilities

IceHrm <= 7.1 suffers from multiple vulnerabilities including Local File Inclusion, Cross-Site Scripting, Malicious File Upload, Cross-Site Request Forgery and Code Execution. Proof of Concept (PoC): http://zsltest/icehrm/app/?g=../&n=../../../../etc/passwd%00

MS14-068 Exploit

MS14-068 is a vulnerability in the Kerberos authentication protocol that allows an attacker to impersonate any user in the domain, including domain administrators. The vulnerability is caused by a flaw in the way Kerberos handles authentication requests for users with long usernames. By sending a specially crafted authentication request, an attacker can bypass the Kerberos authentication process and gain access to the domain as any user.

SQL Injection in PBBoard CMS

Multiple SQL injection vulnerabilities have been found and confirmed within the software as an anonymous user. A successful attack could allow an anonymous attacker to access information such as username and password hashes that are stored in the database. The following URLs and parameters have been confirmed to suffer from SQL injection.

Advertise With Pleasure! (AWP) <= 6.6 - SQL Injection vulnerability

A SQL injection vulnerability exists in Advertise With Pleasure! (AWP) version 6.6 and earlier. An attacker can exploit this vulnerability to gain access to plaintext passwords stored in the database. This is done by sending a specially crafted HTTP request to the vulnerable server containing malicious SQL code in the 'group_id' parameter.

Unauthenticated XSS, Arbitrary URL Redirect and Command Injection in ping field

The Wireless N ADSL 2/2+ Modem Router with firmware version V2.05.C29GV, manufactured by Technicolor and model DT5130, is vulnerable to Unauthenticated XSS, Arbitrary URL Redirect and Command Injection. An attacker can exploit this vulnerability by sending a specially crafted request containing malicious JavaScript code to the router. This code will be executed in the context of the user's browser. An attacker can also exploit this vulnerability by sending a specially crafted request containing a malicious URL to the router. This URL will be used to redirect the user to a malicious website. An attacker can also exploit this vulnerability by sending a specially crafted request containing a malicious command to the router. This command will be executed in the context of the router.

Recent Exploits: