header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Boxoft wav to mp3 converter SEH bypass technique tested on Win7x64

A buffer overflow was found after constructing a .wav payload over 4000 characters and attempting to convert the payload to a .mp3 file. A jump to shellcode was used, followed by a pop pop retn. The shellcode used was a MessageBox shellcode from exploit-db.com.

Cyberoam : Blind SQL Injection

The username field in the captive portal of Cyberoam NG firewall is vulnerable to SQL Injection and can be exploited to execute sql commands on the database. The username field is vulnerable to the following types of SQL Injections: a) Boolean-based blind sql injection b) Stacked queries.

Viber Non-Printable Characters Handling Denial of Service Vulnerability

Viber is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service condition, denying service to legitimate users. This issue is due to the application's failure to properly handle non-printable characters. An attacker can exploit this issue by sending a specially crafted message to the affected application. This issue affects Viber 4.2.0 on IOS 7.1.2.

CVE-2012-3448 PoC

This PoC will create a dummy file in the /tmp folder and will copy /etc/passwd to /tmp. To modify the attack payload, modify the code below. Setup: Ubuntu Linux 14.04 LTS x86 with Ganglia Web Frontend 3.5.0. Attacker puts the contents of this PoC file into the file: /tmp/attack.php. Attacker visits the Ganglia Web Frontend interface with version < 3.5.1 as: http://targetIP/ganglia/graph.php?g=../../../../tmp/attack&metric=DUMMY&title=DUMMY. Confirm that the PoC created a dummy file in the /tmp folder and copied /etc/passwd to /tmp.

Edimax PS-1206MF – Web Admin Auth Bypass

Edimax PS-1206MF is vulnerable to authentication bypass. By sending a POST request to .cgi, an attacker can change specific settings or even reset the admin password without knowing the current password. By default, it is necessary to know the current password in order to change it, but when the request is missing POST anewpass & confpass parameters, the admin password will be set to null.

Wolf CMS 0.8.2 Arbitrary File Upload To Command Execution

Every registered users who have access of upload functionality can upload an Arbitrary File Upload To perform Command Execution. The vulnerable URL is http://targetsite.com/wolfcms/?/admin/plugin/file_manager/browse/ and the vulnerable parameter is 'filename'. To exploit this vulnerability, a user must login as a regular user with access to upload functionality, go to the vulnerable URL, select the upload an file option to upload an arbitrary file (e.g. 'hello.php'), and then access the file at http://targetsite.com/wolfcms/public/hello.php.

Recent Exploits: