header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

vBTube Multiple Cross-Site Scripting Vulnerabilities

vBTube is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

PHP 4.4.5/4.4.6 session_decode() Double Free Vulnerability

This exploit takes advantage of a double free vulnerability in the PHP session_decode() function in versions 4.4.5 and 4.4.6. By triggering the double free, an attacker can overwrite a pointer to the destructor and gain control over the program's execution.

PHP Nuke Arbitrary File Upload Vulnerability

The PHP Nuke application is prone to an arbitrary-file-upload vulnerability because the application fails to adequately sanitize user-supplied input. An attacker can exploit this issue to upload arbitrary code and run it in the context of the webserver process.

Microsoft Lync Server 2010 Remote Command-Injection Vulnerability

Microsoft Lync Server 2010 is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Attackers can exploit this issue to execute arbitrary commands in the context of the application.

WebFileExplorer SQL Injection Vulnerabilities

WebFileExplorer is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

WP Pixarbay Images Multiple Vulnerabilities

The WP Pixarbay Images plugin for Wordpress is affected by multiple vulnerabilities, including authentication bypass, arbitrary file upload, path traversal, and cross-site scripting (XSS). An attacker can exploit these vulnerabilities to execute arbitrary code, upload malicious files, and perform cross-site scripting attacks.

ManageEngine Multiple Products Authenticated File Upload

This module exploits a directory traversal vulnerability in ManageEngine ServiceDesk, AssetExplorer, SupportCenter and IT360 when uploading attachment files. The JSP that accepts the upload does not handle correctly '../' sequences, which can be abused to write in the file system. Authentication is needed to exploit this vulnerability, but this module will attempt to login using the default credentials for the administrator and guest accounts. Alternatively you can provide a pre-authenticated cookie or a username / password combo. For IT360 targets enter the RPORT of the ServiceDesk instance (usually 8400). All versions of ServiceDesk prior v9 build 9031 (including MSP but excluding v4), AssetExplorer, SupportCenter and IT360 (including MSP) are vulnerable. At the time of release of this module, only ServiceDesk v9 has been fixed in build 9031 and above. This module has been been tested successfully in Windows and Linux on several versions.

Recent Exploits: