header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bifrost 1.2.1 Exploit

The Bifrost 1.2.1 exploit is a buffer overflow vulnerability that allows an attacker to execute arbitrary code on a remote system. The vulnerability exists in the 'header' function, which is called when generating the header for a Bifrost connection. By sending a specially crafted request, an attacker can overwrite the return address of the function and gain control of the execution flow. This exploit uses a combination of techniques, including RC4 encryption and shellcode injection, to bypass security measures and achieve remote code execution.

Directory Traversal Vulnerability in File Transfer

File Transfer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting this issue allows an attacker to access arbitrary files outside of the application's root directory. This can expose sensitive information that could help the attacker launch further attacks.

phpBP <= RC3 (2.204) (sql/cmd) Remote Code Execution Exploit

This exploit allows an attacker to execute remote code on a phpBP RC3 (2.204) server. The vulnerability is caused by a SQL injection and command injection vulnerability in the phpBP script. To successfully exploit this vulnerability, the attacker needs to have an admin session.

Publish-It 3.6d – SEH Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in Publish-It 3.6d. By opening a specially crafted .pui file with the 'Automatic Preview' option enabled, an attacker can trigger a stack-based buffer overflow, potentially allowing for remote code execution. The exploit is in the form of a .pui file named 'motiv.pui'.

AuraCMS SQL Injection Vulnerabilities

Two SQL injection vulnerabilities in AuraCMS allow remote authenticated attackers to execute arbitrary SQL commands in the application's database. The first vulnerability (CVE-2014-1401) is due to insufficient validation of the 'search' parameter in the '/index.php' script. The second vulnerability is due to insufficient validation of certain HTTP headers in the '/index.php' script.

ComVironment 4.0 Remote Code Execution

The ComVironment 4.0 application is vulnerable to remote code execution. This vulnerability exists in the 'grab_globals.lib.php' file, specifically on line 3. The vulnerable code can be exploited by providing a malicious code in the 'inc_dir' parameter. An attacker can craft a specially crafted URL to execute arbitrary code on the target system.

Pandora FMS Remote Code Execution

This module exploits a vulnerability found in Pandora FMS 5.0RC1 and lower. It will leverage an unauthenticated command injection in the Anyterm service on port 8023. Commands are executed as the user 'pandora'. In Pandora FMS 4.1 and 5.0RC1 the user 'artica' is not assigned a password by default, which makes it possible to su to this user from the 'pandora' user. The 'artica' user has access to sudo without a password, which makes it possible to escalate privileges to root. However, Pandora FMS 4.0 and lower force a password for the 'artica' user during installation.

Recent Exploits: