header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kallithea 0.2.9 (came_from) HTTP Response Splitting Vulnerability

Kallithea suffers from a HTTP header injection (response splitting) vulnerability because it fails to properly sanitize user input before using it as an HTTP header value via the GET 'came_from' parameter in the login instance. This type of attack not only allows a malicious user to control the remaining headers and body of the response the application intends to send, but also allow them to create additional responses entirely under their control.

VeryPDF Image2PDF Converter SEH Buffer Overflow

The title parameter contained within the c:windowsImage2PDF.INI is vulnerable to a buffer overflow. This can be exploited using SEH overwrite. Instructions: 1. Run this sploit as-is. This will generate the new .ini file and place it in c:windows, overwriting the existing file 2. Run the Image2PDF program, hit [try], file --> add files 3. Open any .tif file. Here's the location of one that comes with the installation: C:Program Files (x86)VeryPDF Image2PDF v3.2trial.tif 4. Hit 'Make PDF', type in anything for the name of the pdf-to-be, and be greeted with your executed shellcode;

GLPI 0.85.5 RCE through file upload filter bypass

The application allows users to upgrade their own profile. The user has the possibility to add a new photo as attachment. The photo that he uploads will be stored into GLPI_ROOT/files/_pictures/. This file, for example named 'photo.jpeg', will be directly accessible through 'http://host/GLPI_ROOT/files/_pictures/XXXX.jpeg', where 'XXXX' is an ID automatically generated by the system and visible in the HTML source code. Besides, the server does not check the extension of the uploaded file, but only the first bytes within it, that indicates which kind of file is. Exploiting this flaw, an attacker may upload a tampered jpeg file that contains php code placed at the end of the file, so that, just changing the file extention to '.php', by default the php code will be interpreted!

MGC ALERT 2015-002

This bug was found using the portal with authentication as administrator. To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application. It is possible to inject SQL code in the variable 'status' on the page 'members.php'.

Last PassBroker Stack-based BOF

A buffer overflow vulnerability exists in LastPassBroker.exe when a maliciously crafted input is supplied to the password field. This can be exploited to cause a stack-based buffer overflow by supplying a large amount of data to the password field. This can lead to arbitrary code execution.

AlienVault – ossim CSRF

Multiple CSRF vectors exists within AlienVault ossim allowing the following attacks: 1)Delete user accounts(ex.admin account) 2)Delete knowledge DB items. The only thing the attacker needs to do is sending the link to the victim via GET request, if the victim authenticated on the ossim and click on the link the following attacks can be occurred.

Recent Exploits: