header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kaltura Remote PHP Code Execution over Cookie

This module exploits an Object Injection vulnerability in Kaltura. By exploiting this vulnerability, unauthenticated users can execute arbitrary code under the context of the web server user. Kaltura makes use of a hardcoded cookie secret which allows to sign arbitrary cookie data. After passing this signature check, the base64-decoded data is passed to PHPs unserialize() function which allows for code execution. The constructed object is again based on the SektionEins Zend code execution POP chain PoC. Kaltura versions prior to 13.1.0 are affected by this issue. A valid entry_id (which is required for this exploit) can be obtained from any media resource published on the kaltura installation. This module was tested against Kaltura 13.1.0-2 installed on Ubuntu 14.04.

RAVPower – remote root

This exploit allows an attacker to gain remote root access on RAVPower devices. It takes advantage of a vulnerability in the upload functionality of the device's web interface, allowing the attacker to upload a malicious file that will overwrite important system files and create a backdoor. By exploiting this vulnerability, the attacker can gain full control over the device and execute arbitrary commands as root.

phpRealty 0.02 (MGR) Remote File include

The phpRealty 0.02 script is vulnerable to remote file inclusion. The vulnerability exists in the 'index.php', 'p_ins.php', and 'u_ins.php' files in the 'manager/admin' directory. An attacker can exploit this vulnerability by including a malicious script via the 'MGR' parameter in the URL. This can lead to remote code execution and potentially compromise the affected system.

AuraCMS version 1.5rc – Multiple Remote SQL Injection Vulnerabilities

There are multiple instances in different files of AuraCMS version 1.5rc where user input variable $id is not properly filtered before being used in SQL queries, allowing attackers to manipulate SQL statements through the browser. This can lead to unauthorized access to the database and potential data leakage.

Joomla Component Restaurante <= Remote File Upload Vulnerability

Attacker can upload any file using the link joomla/index.php?option=com_restaurante&task=upload. After uploading the file, the attacker can find it in /components/com_restaurante/img_original directory. The attacker should add (.) before the filename. Example: if the attacker uploaded a file named shell.php.jpg, its name will be like .shell.php.jpg in the path /components/com_restaurante/img_original/.shell.php.jpg.

Recent Exploits: