header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ISPConfig < 3.1.13 - Remote Command Execution

There is an include on almost all the php files, which includes the language template. The vulnerability allows an attacker to execute arbitrary commands on the server by manipulating the language parameter. By exploiting this vulnerability, an attacker can compromise the entire clients of the ISPConfig.

PHP 5.x COM functions safe_mode and disable_function bypass

This exploit allows an attacker to bypass the safe_mode and disable_function restrictions in PHP 5.x COM functions, potentially leading to remote code execution and compromise of the server. The vulnerability can be exploited both locally and remotely, with remote execution requiring a server that is MS-based and configured to work with PHP. The exploit takes advantage of the fact that the script is executed from a client that does not check Windows protections against execution of dangerous COM objects. The exploit works on Windows servers running Apache and PHP, and has been tested on Windows XP Pro SP2.

PeopleAggregator 1.2pre6 Multiple Remote File Inclusion Vulnerabilities

Multiple remote file inclusion vulnerabilities exist in PeopleAggregator 1.2pre6. These vulnerabilities allow an attacker to include arbitrary files from remote servers, potentially leading to remote code execution or information disclosure.

H2 Database 1.4.196 – Remote Code Execution

This takes advantage of the CREATE ALIAS RCE (https://www.exploit-db.com/exploits/44422/). When the test database has a password that is unknown, it is still possible to get the execution by creating a new database. The web console allows this by entering the name of the new database in the connection string. When the new database is created, the default credentials of username “sa” and password “” (blank) are created. The attacker is logged in automatically. The attached Python code, modified from 44422, demonstrates this.

Zahir Enterprise Plus 6 build 10b – Buffer Overflow (SEH)

Vulnerability occurs when the Zahir cannot handle large inputs and anomalies crafted CSV file. The Zahir main program failed to process the CR LF (Carriage Return Line Feed) characters which caused the Zahir main program to crash.

Recent Exploits: