header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpDolphin <= 2.0.5 CSRF

We've found no protection against CSRF (Cross-site Request Forgery), which made possible to do any kind of act on a user (or admin) account. NO FORMS are secured at all. But we've included some interesting examples. These examples execute actions on the user account while he's visiting a special page prepared by us in any other server. He won't know anything while visiting, as nothing is shown. Logging an user off, posting on user's timeline and changing user password are some of the examples.

Applications Manager 12.5 Arbitrary Command Execution Exploit

Applications Manager suffers from arbitrary command execution. Attackers can exploit this issue using the Upload Files/Binaries feature and adding a command with respected arguments using a .bat file to given binary for execution. In combination with the CSRF, Privilege Escalation, Arbitrary exe and bat file creation and executing system commands with SYSTEM privileges.

Manage Engine Applications Manager 12 Multiple Vulnerabilities

The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Multiple cross-site scripting vulnerabilities were also discovered. The issue is triggered when input passed via the multiple parameters is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

SevOne NMS <= 5.3.6.0 reverse shell remote root

This exploit allows an attacker to gain a reverse root shell on a vulnerable SevOne NMS server running version 5.3.6.0 or lower. The exploit works by sending a malicious payload to the SevOne PAS server, which is then executed by the server. The payload contains a python script that creates a reverse shell back to the attacker's machine.

Heap corruption buffer underflow in devenum.dll!DeviceMoniker::Load()

There exists a buffer underflow vulnerability in devenum.dll!DeviceMoniker::Load when attempting to null terminate a user supplied string. The function as it exists on Windows 7 x86 is implemented as follows: When the code goes to NULL terminate this buffer it divides the length by 2 and subtracts 2 (v4 is a wchar_t) leading to "x00x00" being written 2 bytes before the allocated buffer. This object "device.1" or {4315D437-5B8C-11D0-BD3B-00A0C911CE86} is reachable from any bit of software that performs an IPersistStream::Load on an arbritrary object. This vulnerable object is also reachable from any bit of software performing an OleLoad(IID_IOleObject) call with an with an attacker controlled CLSID -- as is the case in Office.

WhatsUp Gold v16.3 Unauthenticated Remote Code Execution

This exploit uses a SQL injection vulnerability in WhatsUp Gold v16.3 to execute arbitrary code on the target system. The exploit sends a specially crafted SOAP request to the iDroneComAPI.asmx web service, which contains a malicious SQL query. This query creates a new ASP page on the target system, which contains a script that can be used to execute arbitrary code. The exploit then sends a request to the newly created page, which executes the code.

Default Root Password and Remote Enrollment on FingerTec Devices

Almost all FingerTec Access Control devices are running with open telnet, with a hardcoded default root password. Additionally, it is trivial to enroll a new administrative user on the device with a pin code or RFID card that will allow opening the door.

Recent Exploits: