header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress PHPMailer Host Header Command Injection

This module exploits a command injection vulnerability in WordPress version 4.6 with Exim as an MTA via a spoofed Host header to PHPMailer, a mail-sending library that is bundled with WordPress. A valid WordPress username is required to exploit the vulnerability. Additionally, due to the altered Host header, exploitation is limited to the default virtual host, assuming the header isn't mangled in transit. If the target is running Apache 2.2.32 or 2.4.24 and later, the server may have HttpProtocolOptions set to Strict, preventing a Host header containing parens from passing through, making exploitation unlikely.

Serviio Media Server checkStreamUrl Command Execution

This module exploits an unauthenticated remote command execution vulnerability in the console component of Serviio Media Server versions 1.4 to 1.8 on Windows operating systems. The console service exposes a REST API which does not require authentication. The 'action' API endpoint does not sufficiently sanitize user-supplied data in the 'VIDEO' parameter of the 'checkStreamUrl' method. This parameter is used in a call to cmd.exe resulting in execution of arbitrary commands. This module has been tested successfully on Serviio Media Server versions 1.4.0, 1.5.0, 1.6.0 and 1.8.0 on Windows 7.

LabF nfsAxe 3.7 FTP Client Buffer Overflow (SEH)

This exploit demonstrates a buffer overflow vulnerability in the LabF nfsAxe 3.7 FTP Client. The exploit takes advantage of a stack-based buffer overflow in the application's handling of user-supplied input. By sending a specially crafted FTP command, an attacker can overwrite the structured exception handler (SEH) and gain control of the program's execution flow. This vulnerability can be exploited to execute arbitrary code on the target system.

Joomla Component Pony Gallery <= 1.5 Remote Blind SQL Injection Vulnerability

This vulnerability allows an attacker to perform blind SQL injection in the Joomla Component Pony Gallery version 1.5 and below. By manipulating the 'catid' parameter in the 'viewcategory' function, an attacker can inject SQL code and potentially retrieve sensitive information from the database.

Disclosure of Uninitialized Pool Memory in nt!NtTraceControl System Call

The handler of the nt!NtTraceControl system call discloses portions of uninitialized pool memory to user-mode clients on Windows 10 systems. The uninitialized values are copied back to user-mode, which can potentially expose sensitive information.

Vanilla Forums Remote Code Execution (RCE) PoC Exploit

This exploit allows remote code execution in Vanilla Forums version 2.3. It takes advantage of two vulnerabilities: CVE-2016-10033 (RCE) and CVE-2016-10073 (Header Injection). The exploit code can be found at https://exploitbox.io/exploit/vanilla-forums-rce-exploit.sh. More information can be found in the full advisory at https://exploitbox.io/vuln/Vanilla-Forums-Exploit-RCE-0day-Remote-Code-Exec-CVE-2016-10033.html. Other related advisories include: https://exploitbox.io/vuln/WordPress-Exploit-4-6-RCE-CODE-EXEC-CVE-2016-10033.html and https://exploitbox.io/vuln/Vanilla-Forums-Exploit-Host-Header-Injection-CVE-2016-10073-0day.html. For more details on the vulnerability and exploitation, refer to the white-paper 'Pwning PHP mail() function For Fun And RCE' at https://exploitbox.io/paper/Pwning-PHP-Mail-Function-For-Fun-And-RCE.html.

Recent Exploits: