header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mac OSX Server DirectoryService buffer overflow

A memory corruption vulnerability was found in Mac OSX Directory Service. By sending a maliciously crafted message, a remote attacker could cause the directory server to terminate or execute arbitrary code with system privileges. The issue existed in the directory server's handling of messages from the network.

ruubikcms v1.1.1 Path Traversal vulnerability

ruubikcms is vulnerable to Path traversal vulnerability, when logged in with any user account, list of files and directory names present on server will be displayed by changing path in URL, this vulnerability exist in 'tinybrowser.php'. Also using the same vulnerability we can create folders on server with path of our choice!

PEStudio Version 3.69 Denial of Service

A Denial of Service vulnerability exists in PEStudio Version 3.69 due to a memory corruption issue in the peparser.dll module. The vulnerability can be triggered by passing a specially crafted argument to the vulnerable function. This can result in a crash of the application.

Cuppa CMS File Inclusion

An attacker might include local or remote PHP files or read non-PHP files with this vulnerability. User tainted data is used when creating the file name that will be included into the current file. PHP code in this file will be evaluated, non-PHP code will be embedded to the output. This vulnerability can lead to full server compromise.

Exim sender_address Parameter – Remote Command Execution Exploit

A vulnerability was found in Exim by RedTeam Pentesting GmbH which allows for remote command execution. An exploit was written by eKKiM which allows for a PERL reverse shell to be uploaded to a webserver and executed. The PERL REVERSE SHELL MY_CONNECTBACK_IP and MY_CONNECTBACK_PORT must be edited and the PERL_SHELL variable must be set to the connectback script URL.

Netgear WPN824v3 Unauthorized Config Download

The Netgear RangeMax Wireless Router (model WPN824v3) allows to download the config file without authorization. The vulnerability can be exploited with your browser: http://[local-ip]/cgi-bin/NETGEAR_wpn824v3.cfg. If remote management is enabled: http://[remote-ip]:8080/cgi-bin/NETGEAR_wpn824v3.cfg

Seowonintech routers <= fw: 2.3.9 remote root file dumper

This exploit allows an attacker to remotely dump files from a Seowonintech router running firmware version 2.3.9 or lower. The exploit is written in Perl and uses the LWP::Simple module to connect to the router and retrieve the contents of the requested file. The exploit is triggered by passing the full path of the file to be dumped as an argument to the script.

ModSecurity DOS Check

When ModSecurity receives a request body with a size bigger than the value set by the 'SecRequestBodyInMemoryLimit' and with a 'Content-Type' that has no request body processor mapped to it, ModSecurity will systematically crash on every call to 'forceRequestBodyVariable' (in phase 1).

Recent Exploits: