header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

InduSoft Web Studio ISSymbol.ocx InternationalSeparator() Heap Overflow

This module exploits a heap overflow found in InduSoft Web Studio <= 61.6.00.00 SP6. The overflow exists in the ISSymbol.ocx, and can be triggered with a long string argument for the InternationalSeparator() method of the ISSymbol control. This modules uses the msvcr71.dll form the Java JRE6 to bypass ASLR.

Enterpriser16 Load Balancer v7.1 – Multiple Web Vulnerabilities

Multiple persistent input validation web vulnerabilities are detected in the Enterpriser16 v7.1 Load Balancer Application. The bug allows remote attackers to implement/inject own malicious script code on the application side (persistent) of the service. The first vulnerabilities are located in the `Edit Configuration` module with the bound vulnerable Label, Virtual Host, Request to send, Email Alerts and Response expected parameters. The secound vulnerabilities are located in the Create Solution, Access points and New Contract module with the bound vulnerable title, asset name, contract name, name or description parameter requests. Exploitation requires low user interaction and a low privileged application user account. Successful exploitation of the vulnerability can lead to persistent session hijacking (manager/admin), persistent phishing or persistent module web context manipulation.

SonicWall SonicOS 5.8.1.8 WAF – POST Inject Vulnerability

A persistent POST Injection (input validation) vulnerability is detected in the official DELL Sonicwall SonicOS v5.8.1.8 Firewall Series Appliance Application. The vulnerability typus allows an attacker to inject via POST request own malicious script code in the vulnerable module on application side (persistent).

CommandLine Buffer Overflow Vulnerability in DIMIN Viewer 5

A buffer overflow vulnerability exists in DIMIN Viewer 5, which is caused by improper bounds checking of user-supplied data. An attacker can exploit this vulnerability by sending a specially crafted file to the vulnerable application. This can result in arbitrary code execution in the context of the application.

Clockstone and Various other CMSMasters Theme File Upload Vulnerabilities

A file upload vulnerability was discovered in Clockstone WordPress Theme & Various CMSMasters Themes, which allowed anyone to access a victim's site, by uploading whatever files they wanted to the site. The code that allowed this attack to happen, was in several files which did not require user authentication from logged in WordPress users, and anyone visiting the url directly would be able to execute the script directly.

Crystal Reports CrystalPrintControl ActiveX ServerResourceVersion Property Overflow

This module exploits a heap based buffer overflow in the CrystalPrintControl ActiveX, while handling the ServerResourceVersion property. The affected control can be found in the PrintControl.dll component as included with Crystal Reports 2008. This module has been tested successfully on IE 6, 7 and 8 on Windows XP SP3 and IE 8 on Windows 7 SP1. The module uses the msvcr71.dll library, loaded by the affected ActiveX control, to bypass DEP and ASLR.

phpwcms <= v1.5.4.6 "preg_replace" remote code execution exploit

Multiple remote code execution bugs exist in phpwcms for quite some time now. In order to exploit the vulnerabilities, an attacker will need to have access to an authenticated account as either a "backend user", "admin user" or "frontend / backend user". The only account that cannot exploit these vulnerabilities is the "frontend user". Examples of the exploit include lines 699-700, 704, 708, 792 and 807 of ./include/inc_front/content.func.inc.php.

Recent Exploits: