header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Misfortune Cookie Exploit (RomPager <= 4.34) router authentication remover

Misfortune Cookie is a critical vulnerability that allows an intruder to remotely take over an Internet router and use it to attack home and business networks. With a few magic cookies added to your request, an intruder can bypass any authentication and browse the configuration interface as admin, from any open port.

EMC M&R (Watch4net) lacks Cross-Site Request Forgery protection

It was discovered that EMC M&R (Watch4net) does not protect against Cross-Site Request Forgery (CSRF) attacks. A successful CSRF attack can compromise end user data and may allow an attacker to perform an account hijack. If the targeted end user is the administrator account, this results in a full compromise of Watch4net.

Time-based SQL Injection in Admin panel ImpressCMS <= v1.3.9

This bug was found using the portal with authentication as administrator. To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application. It is possible to inject SQL code in the variable 'quicksearch_mod_profile_Field' on the page '/modules/profile/admin/field.php'.

libgd Signedness Vulnerability

A signedness vulnerability (CVE-2016-3074) exist in libgd 2.1.1 which may result in a heap overflow when processing compressed gd2 data. 4 bytes representing the chunk index size is stored in a signed integer, chunkIdx[i].size, by `gdGetInt()' during the parsing of GD2 headers. A size of <= 0 results in `compMax' retaining its initial value during the loop, followed by it being incremented to 1. Since `compMax' is used as the nmemb fpr `gdCalloc()', a heap overflow will occur.

Advantech WebAccess Dashboard Viewer Arbitrary File Upload

This module exploits an arbitrary file upload vulnerability found in Advantech WebAccess 8.0. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebAccess Dashboard Viewer. Insufficient validation within the uploadImageCommon function in the UploadAjaxAction script allows unauthenticated callers to upload arbitrary code (instead of an image) to the server, which will then be executed under the high-privilege context of the IIS AppPool.

Yasr Console Screen Reader – Buffer Overflow

Yasr is a general-purpose console screen reader for GNU/Linux and other Unix-like operating systems. This exploit is for educational purposes only. It uses a buffer overflow vulnerability to execute a shellcode. The exploit consists of a junk of 298 bytes, a shellcode of 28 bytes, 12 NOPs and an EIP of 4 bytes.

NationBuilder Multiple Stored XSS Vulnerabilities

The application suffers from multiple stored XSS vulnerabilities. Input passed to several POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

CompuSource Systems – Real Time Home Banking – Local Privilege Escalation/Arbitrary Code Execution

The application installs with LOCAL SYSTEM service credentials in the directory %SystemRoot%/css50/csdir. The executables that are installed, by default, allow AUTHENTICATED USERS to modify, replace or alter the file. This would allow an attacker to inject their code or replace the executable and have it run in the context of the system, allowing complete compromise of a machine on which it was installed, giving the process LOCAL SYSTEM access to the machine in question.

Recent Exploits: