header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Imperva SecureSphere PWS Command Injection

This module exploits a command injection vulnerability in Imperva SecureSphere 13.x. The vulnerability exists in the PWS service, where Python CGIs didn't properly sanitize user supplied command parameters and directly passes them to corresponding CLI utility, leading to command injection. Agent registration credential is required to exploit SecureSphere in gateway mode. This module was successfully tested on Imperva SecureSphere 13.0/13.1/13.2 in pre-ftl mode and unsealed gateway mode.

FreeBSD Intel SYSRET Privilege Escalation

This module exploits a vulnerability in the FreeBSD kernel, when running on 64-bit Intel processors. By design, 64-bit processors following the X86-64 specification will trigger a general protection fault (GPF) when executing a SYSRET instruction with a non-canonical address in the RCX register. However, Intel processors check for a non-canonical address prior to dropping privileges, causing a GPF in privileged mode. As a result, the current userland RSP stack pointer is restored and executed, resulting in privileged code execution. This module has been tested successfully on FreeBSD 8.3-RELEASE (amd64) and FreeBSD 9.0-RELEASE (amd64).

Anyburn 4.3 – ‘Copy disc to image file’ Buffer Overflow – (UNICODE)(SEH)

The exploit allows an attacker to overflow the buffer in the 'Copy disc to image file' function of Anyburn version 4.3. By providing a specially crafted file name, an attacker can execute arbitrary code on the target system. The exploit takes advantage of a buffer overflow vulnerability and uses a unicode mixed shellcode to bypass security measures. The shellcode spawns the Windows calculator application (calc.exe) as a proof of concept.

QNAP TS-431 QTS < 4.2.2 - Remote Command Execution

This module creates a virtual web server and uploads the php payload into it. Admin privileges cannot access any server files except File Station files. The user who is authorized to create Virtual Web Server can upload malicious php file by activating the server. Exploit creates a new directory into File Station to connect to the web server. However, only the 'index.php' file is allowed to work in the virtual web server directory. No files can be executed except 'index.php'. Gives an access error. After the harmful 'index.php' has been uploaded, the shell can be retrieved from the server. There is also the possibility of working in higher versions.

binder driver allows userspace to free buffers in kernel-managed shared memory region

The binder driver in the Linux kernel allows userspace to free buffers in the kernel-managed shared memory region by using the BC_FREE_BUFFER command. This can lead to memory corruption and potential privilege escalation.

Perl script for exploiting PHPNuke vulnerability

This Perl script is used to exploit a vulnerability in PHPNuke. It allows an attacker to inject arbitrary code and create a new message in the admin panel. The script sends a POST request with the necessary parameters to the admin.php endpoint of the target website. The injected code is executed when the message is viewed by visitors. This exploit was published on milw0rm.com on September 16, 2004.

WordPress Cerber Security, Antispam & Malware Scan – Multiple Bypass Vulnerabilities

There are multiple bypass vulnerabilities in the WordPress Cerber Security, Antispam & Malware Scan plugin. These vulnerabilities include:1. Stop user enumeration bypass: It is possible to bypass user enumeration protection by using the Post method instead of Get.2. Protect admin scripts bypass: Admin scripts protection can be bypassed by adding one or more slashes to the URI.3. Protects wp-login.php, wp-signup.php and wp-register.php from attacks bypass: This protection can be bypassed by encoding any character in the URI.4. Hide login URL bypass: The login URL can be bypassed by encoding any character in the URI, which will cause Cerber to return the secret slug in the Location header field.5. Stop user enumeration via REST API bypass: User enumeration can be bypassed by inserting /index.php/ between the domain and the REST route.6. Disable REST API bypass: Same as above.

Recent Exploits: