header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Realtyna RPL 8.9.2 Joomla Extension Multiple SQL Injection Vulnerabilities

Realtyna RPL suffers from multiple SQL Injection vulnerabilities. Input passed via multiple POST parameters is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Easy File Sharing Web Server v7.2 Remote SEH Based Overflow

A buffer overflow vulnerability exists in Easy File Sharing Web Server v7.2 when sending 4059 bytes of data to the /changeuser.ghp file, which overwrites the EBX register. This can be exploited to execute arbitrary code by sending a crafted request with a malicious payload. Tested on Win7 x64 and x86, it should work on win8/win10.

Subrion 3.X.X – Multiple Exploits

The installation folder never get deleted or protected unless you deleted it yourself, which let any unauthorized user access the installation panel and ruin your website in just a few steps.

Beckhoff CX9020 CPU Module Web Exploit (RCE)

This POC allows to reboot any CX9020 PLC and add random (Web) users to be configured. It is vulnerable to a Remote Code Execution vulnerability, similar to CVE-2015-4051, but different service IPC Diagnostics Authentication <> Web Authentication.

PwnSpeak a 0day Exploit for TeamSpeak Client <= 3.0.18.1 RFI to RCE

The bug is a simple but Critical RFI(Remote File Inclusion), and in my test case on 'Windows' you can reach remote code execution. By changing the channel description you can insert a [img] bb tag with malicious content. There are a few problems with the image caching on disk. 1: There is no check on file extension. 2: There is no file renaming, and you can fake the extension so you can create in the cache a malicious executable file like hta, scr, msi, pif, vbs etc. 3: Teamspeak 3 Client saves the image and recreates the same directory structure as the server where it's hosted. 4: It is possible to do a Directory Traversal with a simple urlencode of the traversal path bypassing the built-in control.

RealtyScript v4.0.2 Multiple Time-based Blind SQL Injection Vulnerabilities

RealtyScript suffers from multiple SQL Injection vulnerabilities. Input passed via the GET parameter 'u_id' and the POST parameter 'agent[]' is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

RealtyScript v4.0.2 Multiple CSRF And Persistent XSS Vulnerabilities

The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Multiple cross-site scripting vulnerabilities were also discovered. The issue is triggered when input passed via the multiple parameters is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Recent Exploits: