header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oracle Endeca Server Remote Command Execution

This module exploits a command injection vulnerability on the Oracle Endeca Server 7.4.0. The vulnerability exists on the createDataStore method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection has been found to be Windows specific. This module has been tested successfully on Endeca Server 7.4.0.787 over Windows 2008 R2 (64 bits).

Musicbox 2.3.8 Multiple Vulnerabilities

Musicbox 2.3.8 is vulnerable to SQL Injection, XSS and Shell Upload. An attacker can exploit these vulnerabilities by sending malicious payloads to the vulnerable parameters. For SQL Injection, the vulnerable parameter is 'id' in the URL 'genre_albums.php?id=[SQLI]'. For XSS, the vulnerable parameters are 'term' and 'details' in the URL 'index.php?in=song&term=[Cross site scripting/XSS]&action=search&start=0' and 'member.php?uname=[YOUR_USERNAME]'. For Shell Upload, the vulnerable parameter is 'action' in the URL 'admin/adminpanel.php?action=artistgallery'. An attacker can upload a malicious shell/backdoor and access it via 'images/artist/shell.php'.

Belkin G Wireless Router RCE PoC

The exploit works in 3 stages. 1. Authentication. 2. Setting up shellcode in the memory at a known location. 3. Triggering an RA register over-write to execute the shellcode. This particular model of router is based on 'embedded Configurable operating system' a.k.a (eCos) version 2.0. The shellcode used in the exploit is a dummy one that basically just triggers an exception & crashes the router, forcing it to reboot.

DreamMail e-mail client Stored XSS Vulnerability

DreamMail e-mail client is vulnerable to stored XSS. Either opening or viewing the e-mail and the user will get an annoying alert box. The injection point is the body of the e-mail. The payloads used are different types of XSS with different syntaxes, each of which will pop a message box with the message 'XSS' inside.

Path Traversal in DeWeS Web Server: CVE-2013-4900

The vulnerability exists due to insufficient validation of HTTP requests passed to web server. A remote attacker can send a specially crafted HTTP request containing directory traversal sequences (e.g. “..%5c”) and read arbitrary files on the target system with privileges of the user running the vulnerable web server.

Recent Exploits: