header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

D-Link DCS-931L File Upload

This module exploits a file upload vulnerability in D-Link DCS-931L network cameras. The setFileUpload functionality allows authenticated users to upload files to anywhere on the file system, allowing system files to be overwritten, resulting in execution of arbitrary commands. This module has been tested successfully on a D-Link DCS-931L with firmware versions 1.01_B7 (2013-04-19) and 1.04_B1 (2014-04-21). D-Link DCS-930L, DCS-932L, DCS-933L models are also reportedly affected, but untested.

Vulnerable hardware : MediaAccess TG788vn with Cisco http firewall

MediaAccess TG788vn with Cisco firewall http config is vulnerable to critical unauthenticated file disclosure flaw. The http server is running with root privileges, which mean that the attacker might escalate the exploit for further critical attacks.

PHPIPAM v1.1.010 Multiple Vulnerabilities

Through PHPIPAM, external users can try to authenticate on the following page: http://server/phpipam/?page=login. For each try, even if it's a success or a failure, a line is added in the log register. The admin user can read those logs through the back office. Here is an example of authentication log lines: 'User Admin1 logged in.' 'User User1 failed to log in.' A malicious user can use this log feature to make administrator executes JavaScript instructions in his browser. To do so, an external user can try to inject JavaScript instructions in the 'username' field of the authentication form.

Confluence Vulnerabilities

Atlassian Confluence before 5.8.17 contains an information disclsoure vulnerability. A remote authenticated user can read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action.

Ganeti Security Advisory (DoS, Unauthenticated Info Leak)

Ganeti is prone to a SSL DoS with SSL renegociation against the RAPI Daemon. The exploit is available at: https://github.com/pierrekim/advisories/blob/master/ganeti/exploit-ganeti-0x00.py

Multiple Vulnerabilities in Simple PHP Polling System

Simple PHP Polling System helps organizations to make polls of different types of positions with a number of candidates under each position. This vulnerable package has 5869+ downloads till the date. Multiple vulnerabilities (SQL insertion injection, Persistent Cross Site Scripting, Password Reset) exist in the manage-profile.php and registeracc.php pages. In manage-profile.php, there is no filteration or validation for user supplied data, on parameter $_POST['email'], which can be used to inject post parameter email to perform SQL Injection attack. In registeracc.php, there is no filteration or validation for user supplied data, on parameter $_POST['email'], which can be used to inject post parameter email to perform SQL Injection attack. In manage-profile.php page, by changing the value of 'member_id' attacker can reset the user details in the database. In manage-profile.php page, by changing the value of 'first_name' attacker can inject malicious script in the database.

Online Airline Booking System multiple vulnerabilities

Vulnerability exist in admin panel authentication mechanism due to use of $_COOKIE['LoggedIn'] , as $_COOKIE variable can be manipulated by user so any user can login to admin panel without knowing username password. Just set cookie value LoggedIn=yes in request header and web application will let you login. install.php is the page which can be used for application reinstallation. Open link application/install.php and a form will appear, first text field is for new admin username and second field is for new password of web application proceed with installation and web application will setup with new attacker supplied admin username password.

Heap-Buffer-Overflow in CPDF_TextObject::CalcPositionData

The crash was encountered in pdfium (the Chrome PDF renderer) during PDF fuzzing. It was caused by a heap-buffer-overflow on address 0x60700000794c at pc 0x000000cfaaef bp 0x7ffd89a11070 sp 0x7ffd89a11068. The overflow was caused by a read of size 4 at 0x60700000794c. The address was located 4 bytes to the right of 8-byte region [0x607000007948,0x607000007950) allocated by thread T0.

Recent Exploits: