header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TEC-IT TBarCode OCX ActiveX Control (TBarCode4.ocx 4.1.0 ) dos poc

A Denial of Service (DoS) vulnerability exists in TEC-IT TBarCode OCX ActiveX Control (TBarCode4.ocx 4.1.0 ) due to an access violation caused by a comparison of a byte pointer with the value 5. The vulnerability can be triggered by a specially crafted request sent to the vulnerable application. This can result in a crash of the application.

Sending php file in the timeline plugin cover image of SocialEngine 4.5

Logged into the system, enter on profile page of your user. Click 'Change Cover' and then 'Upload Cover' to select the file '*.php' you want to send. After selecting the file upload, this will be sent to an area temporarily, the system detects that the format is not valid, but doesn’t remove, allowing access later. An error message is displayed on the screen. Access can be gained by going to '/srv/www/htdocs/XXXXXXXXXXX/public/temporary/timeline/cover_original_8.php' and exploiting the vulnerability with a command such as 'cat /etc/passwd' or 'cat ../../../install/config/auth.php'.

HP Data Protector Client EXEC_CMD Remote Code Execution Vulnerability

This module exploits HP Data Protector omniinet process on Windows only. This invokes the install service function that allows for a reverse tcp payload to your host. To ensure this works, the SMB server must have a share called Omniback which has a subfolder i386, i.e. \192.168.1.1Omnibacki386",N/A,N/A,2012-13-07,Ben Turner

Novell Client 2 SP3 Privilege escalation exploit

A vulnerability in Novell Client 2 SP3 allows for privilege escalation. The first public information about this bug was from Nikita Tarakanov @NTarakanov. An exploit for demonstration purposes was created and tested on Windows 7 and 8 (x86) / nicm.sys 3.1.11.0. It does not bypass SMEP on Windows 8. A Metasploit module is available for Windows 7.

FluxBB 1.5.3 Multiple Remote Vulnerabilities

FluxBB suffers from a cross-site scripting, cross-site request forgery and URL redirect vulnerability. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed via the 'redirect_url' parameter in 'misc.php' script is not properly verified before being used to redirect users. This can be exploited to redirect a user to an arbitrary website e.g. when a user clicks a specially crafted link to the affected script hosted on a trusted domain. It also fails to properly sanitize user-supplied input to the 'form[board_title]' POST parameter in the 'admin_options.php' script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.

WebDisk 3.0.2 PhotoViewer iOS – Command Execution Vulnerability

A remote command execution web vulnerability is detected in the WebDisk v3.0.2 application (Apple iOS - iPad & iPhone). The vulnerability allows remote attacker to execute code inside of a vulnerable web application module to compromise the device. The vulnerability is located in the afgetdir.ma file when processing to request manipulated path parameters. Remote attackers can execute code from the main application index by using the upload input field.

Private Photos v1.0 iOS – Persistent Path Web Vulnerability

A persistent input validation web vulnerability is detected in the Private Photos v1.0 application (Apple iOS - iDevice). The vulnerability allows remote attackers to inject own malicious script codes to the application-side of the vulnerable service module. The vulnerability is located in the `photo` value of the `/upload` POST method request. Remote attackers are able to inject own malicious script codes to the application-side of the vulnerable service module. The request method to inject is POST and the attack vector is located on the application-side.

Multiple vulnerabilities – Surveillance via Symantec Web Gateway

SEC Consult has identified several vulnerabilities within the components of Symantec Web Gateway in the course of a short crash test. Some components have been spot-checked, while others have not been tested at all. Several of the discovered vulnerabilities below can be chained together in order to run arbitrary commands with the privileges of the 'root' user on the appliance. An attacker can get unauthorized access to the appliance and plant backdoors or access configuration files containing credentials for other systems (eg. Active Directory/LDAP credentials) which can be used in further attacks. Since all web traffic is routed through the appliance, an attacker can also manipulate the traffic and inject malicious content.

Apache Struts 2 DefaultActionMapper Prefixes OGNL Code Execution

In Struts 2 before 2.3.15.1 the information following "action:", "redirect:", or "redirectAction:" is not properly sanitized and will be evaluated as an OGNL expression against the value stack. This introduces the possibility to inject server side code.

Recent Exploits: