header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Reflex Gallery – Arbitrary File Upload

This exploit allows an attacker to upload arbitrary files to the Reflex Gallery plugin in Wordpress. By manipulating the Year and Month parameters in the GET request, the attacker can specify the folder location for the uploaded file. The vulnerable file is php.php, and the exploit involves uploading a file using a form with the specified parameters.

ArcSight Logger – Arbitrary File Upload (Code Execution)

Configuration import file upload capability does not fully sanitize file names, which allows attackers to put executable files into the document root. Upload of server side (JSP) script with shell accessing function in order to gain remote OS command execution has been conducted in the POC. To access vulnerable feature, user has to be authenticated in the console. Feature is available to all users, also non-administrative ones. Shell commands are executed with default NPA privileges (arcsight) giving full control over the service (for instance /etc/init.d/arcsight_logger stop has been successfully performed). The culprit feature is accessible to all authenticated users, including ones with sole read-only admin role.

Multiple Cross-Site Scripting and Directory Traversal Vulnerabilities in Manx

Manx is prone to multiple cross-site scripting and directory-traversal vulnerabilities because it fails to sufficiently sanitize user-supplied input. Exploiting these issues will allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to view arbitrary local files and directories within the context of the webserver. This may let the attacker steal cookie-based authentication credentials. Other harvested information may aid in launching further attacks.

Cross-Site Scripting Vulnerabilities in eSyndiCat Pro

eSyndiCat Pro is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Adobe Flash Player ByteArray UncompressViaZlibVariant Use After Free

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, when trying to uncompress() a malformed byte stream. This module has been tested successfully on Windows 7 SP1 (32 bits), IE 8 to IE 11 and Flash 16.0.0.287, 16.0.0.257 and 16.0.0.235.

Windows Animated Cursor Handling Exploit (0day) (Version3)

This exploit targets the Windows Animated Cursor Handling vulnerability in fully patched Windows Vista. It allows for remote code execution and is considered the first real exploit of its kind on Vista. The exploit has been tested on various Windows versions, including Windows Vista Enterprise Version 6.0 (Build 6000) and Windows Vista Ultimate Version 6.0 (Build 6000) with default installations and UAC enabled. It may also work on other NT-based Windows versions, although further testing is needed. The exploit bypasses the eeye security ani patch.

HP Network Node Manager i Multiple Unspecified Cross-Site Scripting Vulnerabilities

The HP Network Node Manager i is prone to multiple unspecified cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: