header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Check Box 2016 Q2 Survey Multiple Vulnerabilities

Checkbox is a survey application deployed by a number of highly profiled companies and government entities. The vulnerabilities include a directory traversal vulnerability, direct object reference vulnerability, and an open redirection vulnerability. The directory traversal vulnerability allows an attacker to download sensitive files such as the web.config file. The direct object reference vulnerability allows access to attachments without login. The open redirection vulnerability allows an attacker to redirect users to a malicious website.

BoZoN Pre-Auth Command Execution

A Bozon vulnerability allows unauthenticated attackers to add arbitrary users and inject system commands to the "auto_restrict_users.php" file of the Bozon web interface. This issue results in arbitrary code execution on the affected host, attackers system commands will get written and stored to the PHP file "auto_restrict_users.php" under the private/ directory of the Bozon application, making them persist. Remote attackers will get the command responses from functions like phpinfo() as soon as the HTTP request has completed. In addition when an admin or user logs in or the webpage gets reloaded the attackers commands are then executed as they are stored. If a Command is not injected to the "auto_restrict_users.php" file, unauthenticated attackers can opt to add user accounts at will.

DiskBoss Enterprise GET Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in the web interface of DiskBoss Enterprise v7.5.12 and v7.4.28, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1.

Business Networking Script v8.11- SQLi & Persistent Cross Site Scripting

The Business Networking Script v8.11 is vulnerable to SQL Injection and Persistent Cross Site Scripting attacks. The SQL Injection vulnerability can be exploited through the 'gid' parameter in the 'show_group_members.php' page. The Persistent XSS vulnerability exists in the 'home.php' page with the 'first_name' parameter. An attacker can inject malicious code to execute arbitrary SQL queries or perform XSS attacks.

Recent Exploits: