This module tests vulnerable IIS HTTP header file paths on Microsoft Exchange OWA 2003, CAS 2007, 2010, 2013 servers.
Exploit Coded by sickness || EMET 5.0 bypass by ryujin
The Virtual Keyboard plugin for SquirrelMail is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Elxis is prone to an SQL-injection vulnerability and multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Docebo is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This exploit allows for remote privilege escalation in Orion-Blog v2.0 Version. It takes advantage of a bug in the admin default.asp script. By submitting a specific form, an attacker can escalate their privileges.
The BlackBerry Device Software is prone to a cross-domain information-disclosure vulnerability because the application's web browser fails to properly enforce the same-origin policy. An attacker can exploit this issue to access local files or content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or may aid in further attacks.
This is a proof of concept code from the Hardened-PHP Project that demonstrates a double free vulnerability in PHP 5. It allows an attacker to execute arbitrary code by exploiting a memory corruption issue in the session ID handling. The exploit includes a Linux x86 bindshell on port 4444 from Metasploit.
This exploit allows an attacker to gain root access on a vulnerable x86/linux system running wu_ftpd. The exploit utilizes a shellcode to execute arbitrary commands on the target system.
An attacker can exploit an SQL-injection vulnerability in ITS SCADA to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The attacker can use the provided example payload to retrieve a password from the 'Users' table.