header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MiniFtp parseconf_load_setting local-bufferoverflow (318 bytes)

This exploit spawns a shell with root privileges. The exploit will be written into the file miniftpd.conf. The given var settings is a *char and will be splitted into key and value key and value are both 128 char long and settings can be longer than 128 + 128 chars. This issue will not be checked and stored. This causes a buffer overflow.

Admin Express v1.2.5.485 ‘Folder Path’ Local SEH Alphanumeric Encoded Buffer Overflow

Admin Express v1.2.5.485 is vulnerable to a local SEH alphanumeric encoded buffer overflow. The exploit involves manually encoding shellcode and using the sub method for encoding each line of payload. The exploit requires the user to copy the contents of pwn.txt into the left-hand side Folder Path field, and then click the scale icon in the middle of the screen, under the Services and Running Processes tabs. This will execute the shellcode, which in this case is calc.exe.

Reflected Cross Site Scripting (XSS) Vulnerability in Print Archive System v2015 release 2.6

A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6. The user supplied input containing JavaScript is echoed back in JavaScript code in an HTML response via the "TextField" parameter.

NSClient++ 0.5.2.35 – Privilege Escalation

When NSClient++ is installed with Web Server enabled, local low privilege users have the ability to read the web administator's password in cleartext from the configuration file. From here a user is able to login to the web server and make changes to the configuration file that is normally restricted. The user is able to enable the modules to check external scripts and schedule those scripts to run. There doesn't seem to be restrictions on where the scripts are called from, so the user can create the script anywhere. Since the NSClient++ Service runs as Local System, these scheduled scripts run as that user and the low privilege user can gain privilege escalation. A reboot, as far as I can tell, is required to reload and read the changes to the web config.

Sql Injection on microASP (Portal+) CMS

A SQL injection vulnerability exists in microASP (Portal+) CMS, which allows an attacker to execute arbitrary SQL commands on the underlying database. The vulnerability is due to improper input validation of the 'explode_tree' parameter in the 'pagina.phtml' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can allow an attacker to gain access to sensitive information stored in the database, modify or delete data, or execute arbitrary system commands on the underlying operating system.

Sql Injection on PHPads Version 2.0 based on Pixelledads 1.0

A SQL injection vulnerability exists in PHPads Version 2.0 based on Pixelledads 1.0. The vulnerable code is located in the click.php3 file. An attacker can send a specially crafted request to the vulnerable file and execute arbitrary SQL commands in application's database. The vulnerable code is located in the click.php3 file. An attacker can send a specially crafted request to the vulnerable file and execute arbitrary SQL commands in application's database.

ReadyAPI Remote Code Execution Vulnerability

I found a new vulnerability in the (ReadyAPI). It allows an attacker to execute a remote code on the local machine putting in danger the ReadyAPI users including developers, pentesters, etc... The ReadyAPI allows users to open a SOAP project and import WSDL files that help the users to communicate with the remote server easily. The WSDL file owner can determine default values of some parameters. An attacker can impersonate a legitimate web service and inject a malicious code into a default value of one of the parameters and spread it to ReadyAPI clients. When a ReadyAPI client load a malicious WSDL file to his project and send a request containing the malicious code the ReadyAPI will execute the malicious code on the victim's computer.

RCE in Social Warfare Plugin WordPress ( <=3.5.2 )

A remote code execution vulnerability exists in Social Warfare Plugin Wordpress version <=3.5.2. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable server. This will allow the attacker to execute arbitrary code on the vulnerable server.

Recent Exploits: