header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kentico CMS User Enumeration Bug

This vulnerability is an unprotected page on the site where you can view all current users and usernames. To find out if a Kentico CMS is vulnerable go to http://site.com/CMSModules/Messaging/CMSPages/PublicMessageUserSelector.aspx assuming that the Kentico CMS was installed to the root folder in the server.

QNX 6.4.x/6.5.x pppoectl disclose /etc/shadow by cenobyte 2013

QNX setuid root /sbin/pppoectl allows any user to gain access to privileged information such as the root password hash. The vulnerability exists because of a failure to drop privileges or check the permissions and ownership on the file specified as the configuration file. If a user specifies a file such as /etc/shadow, pppoectl will display the first line of the shadow file in the error output.

QNX 6.5.0 x86 phfont local root exploit by cenobyte 2013

Setuid root /usr/photon/bin/phfont on QNX is prone to a buffer overflow. The vulnerability is due to insufficent bounds checking of the PHOTON_HOME environment variable. This is a return-to-libc exploit that yields euid=0. The addresses of system() and exit() are retrieved from libc using dlsym(). During execution of the exploit the argument of system() will be set to sh, and PATH will be set to /tmp. Once /tmp/sh is been executed, the exploit will launch the setuid /tmp/shell yielding the user euid=0.

QNX 6.5.0 x86 io-graphics local root exploit by cenobyte 2013

Setuid root /usr/photon/bin/io-graphics on QNX is prone to a buffer overflow. The vulnerability is due to insufficent bounds checking of the PHOTON2_HOME environment variable. This is a return-to-libc exploit that yields euid=0. The addresses of system() and exit() are retrieved from libc using dlsym(). The address of /bin/sh is retrieved by searching from address 0xb0300000.

QNX 6.4.x/6.5.x ifwatchd local root exploit by cenobyte 2013

This exploit creates a fake arrival-script which will be executed as root by passing it to the -A parameter of /sbin/ifwatchd. The fake arrival-script copies /bin/sh to /tmp/shell and makes it setuid root. Once the setuid shell is in place ifwatchd will be killed to drop the user into the root shell.

KMPlayer 3.8.0.117 Buffer Overflow

KMPlayer 3.8.0.117 is vulnerable to a buffer overflow vulnerability. The vulnerability is triggered when a specially crafted playlist is opened in the KMPlayer Playlist Editor. This causes a stack-based buffer overflow, which allows an attacker to execute arbitrary code. The exploit code contains 250 bytes of junk data followed by a return address pointing to the JMP ESP instruction in kernel32.dll. The exploit code also contains a shellcode that executes calc.exe.

ClipSharePro <= 4.1 Local File Inclusion

ClipsharePro is a paid youtube clone script, suffers from Localfile Inclusion vulnerability through which attacker can include arbitrary file in webapp. The vulnerability can be exploited by sending a request to ubr_link_upload.php with the config_file parameter set to the file path of the file to be included. For successful exploitation, the $MULTI_CONFIGS_ENABLED value should be set to 1 in the config file.

Exploit Title: Ajax File Manager DirectoryTraversal

Ajax File/Image Manager is a l tool to manager files and images remotely. Without extra configs, it's possible to list files from another directory. The vulnerability it's related to 'search' function. In 'search_folder' parameter, escape with ../ or ..%2f

Cross-Site Scripting (XSS) in Ilch CMS

The vulnerability exists due to insufficient sanitisation of user-supplied data in 'text' HTTP POST parameter passed to '/index.php/guestbook/index/newentry' URL. A remote unauthenticated user can send a specially crafted HTTP POST request, which allows to permanently inject and execute arbitrary HTML and script code in user's browser in context of the vulnerable website when the victim visits the 'http://[host]/index.php/guestbook/index/index' URL.

SQL Injection and Improper Access Control in OpenDocMan

The vulnerability exists due to insufficient validation of "add_value" HTTP GET parameter in "/ajax_udf.php" script. A remote unauthenticated attacker can execute arbitrary SQL commands in application's database. The vulnerability exists due to insufficient validation of allowed action in "/signup.php" script when updating userâ??s profile. A remote authenticated attacker can assign administrative privileges to the current account and gain complete control over the application.

Recent Exploits: