The Pindorama 0.1 portal is vulnerable to remote file inclusion. The vulnerability exists in the 'client.php' file of the 'xmlrpc' component. An attacker can exploit this vulnerability by injecting malicious code in the 'c[components]' parameter, leading to remote code execution.
PLC Wireless Router's are vulnerable to a unauthenticated remote reboot which can be achieved through sending a modified http request. The script below will take a user supplied IP address of a PLC router and send the exploit to the device. Use the Shodan dork above to find PLC wireless routers.
The Acunetix Web Vulnerability Scanner 10.0 Build 20150623 is vulnerable to a denial of service attack. By providing a specially crafted input, an attacker can cause the application to crash, resulting in a denial of service condition.
The iSmartViewPro 1.5 software is vulnerable to a local buffer overflow in the 'SavePath for ScreenShots' field. By sending a specially crafted input, an attacker can cause a buffer overflow and potentially execute arbitrary code on the target system.
The vulnerability allows an attacker to include arbitrary files from a remote server.
This exploit allows an attacker to remotely reboot the TP-Link C50 Wireless Router 3 by sending a forged request. The vulnerability exists in the firmware version <= Build 171227 of the router. By exploiting this vulnerability, an attacker can disrupt the normal functioning of the router.
This exploit allows an attacker to bypass the safe_mode and disable_functions protections of the ionCube extension in PHP 5.2.4. By changing the file path, an attacker can retrieve sensitive information, such as source code and password files. The exploit works on Windows XP Pro SP2 with full patches and can be executed from the command line or Apache server.
osTicket application provides a functionality to upload 'html' files with associated formats. However, application does not properly validate the content of file and accepts any type of files.
The directory traversal vulnerability allows an attacker to access sensitive information on the vulnerable system. By manipulating the 'filename' and 'filepath' parameters in GET requests, an attacker can reach configuration files directly.
This exploit makes use of heap space to store the shellcode and bypasses ASLR and DEP to execute the payload successfully.