header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PLC Wireless Router GPN2.4P21-C-CN Authorised Arbitrary File Disclosure

An unauthenticated attacker can send a specially crafted HTTP GET request to the vulnerable router to disclose arbitrary files from the router's file system. The vulnerable router is GPN2.4P21-C-CN with firmware version W2001EN-00, manufactured by ChinaMobile. The attack has been tested on Ubuntu Linux.

PHP 7.0 Object Cloning Local Denial of Service

A Local Denial of Service vulnerability was discovered in PHP 7.0 when cloning an object. This vulnerability occurs when an object is cloned and the __clone() method is defined, which causes an infinite loop. This can be exploited to cause a denial of service condition.

HelpDeskZ = v1.0.2 – Unauthenticated Shell Upload

HelpDeskZ = v1.0.2 suffers from an unauthenticated shell upload vulnerability. The software in the default configuration allows upload for .php-Files ( !! ). I think the developers thought it was no risk, because the filenames get obfuscated when they are uploaded. However, there is a weakness in the rename function of the uploaded file controllers httpsgithub.comevolutionscriptHelpDeskZ-1.0tree006662bb856e126a38f2bb76df44a2e4e3d37350controllerssubmit_ticket_controller.php - Line 141 $filename = md5($_FILES['attachment']['name'].time())...$ext; So by guessing the time the file was uploaded, we can get RCE. Steps to reproduce: httplocalhosthelpdeskzv=submit_ticket&action=displayForm Enter anything in the mandatory fields, attach your phpshell.php, solve the captcha and submit your ticket. Call this script with the base url of your HelpdeskZ-Installation and the name of the file you uploaded exploit.py httplocalhosthelpdeskz phpshell.php

Freepbx Authenticated Remote Code Execution

Freepbx is a web-based open source GUI (graphical user interface) that controls and manages Asterisk (PBX). It suffers from an authenticated remote code execution vulnerability due to the lack of sanitization of the $url parameter before being passed to the 'exec' function. This can be exploited by an authenticated attacker to execute arbitrary code on the vulnerable system.

WordPress CYSTEME Finder Plugin 1.3 – Arbitrary File Dislcosure/Arbitrary File Upload

CYSTEME Finder is an admin file manager plugin for wordpress that fails to check cookie data in the request to http://server/wp-content/plugins/cysteme-finder/php/connector.php. This allows attackers to upload, download, and browse the remote file system. Simply replacing wphome with any other directory path will allow attackers to access the directory.

SimplePHPQuiz – Blind SQL Injection

SimplePHPQuiz is vulnerable to Blind SQL Injection. Attackers can exploit this vulnerability by sending malicious payloads to the vulnerable parameters such as 'correct_answer', 'question', 'wrong_answer1', 'wrong_answer2', and 'wrong_answer3'. By sending a malicious payload, attackers can gain access to the database and extract sensitive information.

Recent Exploits: