header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

iziContents <= RC6 (RFI/LFI) Multiple Remote Vulnerabilities

The iziContents <= RC6 has multiple vulnerabilities that can lead to remote file inclusion, local file inclusion, and remote file disclosure. The RFI vulnerabilities can be exploited through various modules such as search.php, inlinepoll.php, showpoll.php, showlinks.php, and submit_links.php. The LFI vulnerabilities can be exploited through poll_summary.php and db.php. The remote file disclosure vulnerability can be exploited through tiny_mce_gzip.php.

ProcessMaker Plugin Upload

This module will generate and upload a plugin to ProcessMaker resulting in execution of PHP code as the web server user. Credentials for a valid user account with Administrator roles is required to run this module. This module has been tested successfully on ProcessMaker versions 1.6-4276, 2.0.23, 3.0 RC 1, 3.2.0, 3.2.1 on Windows 7 SP 1; and version 3.2.0 on Debian Linux 8.

VideoFlow Digital Video Protection DVP 10 Authenticated Root Remote Code Execution

The affected device suffers from authenticated remote code execution vulnerability. Including a CSRF, a remote attacker can exploit this issue and execute arbitrary system commands granting her system access with root privileges.

PRIVATE Remote Exploit For IMAIL Smtp Server(1.2)

This is a remote exploit for IMAIL Smtp Server(1.2) version 8.01-8.11. The exploit is used to attack the hostname specified using the options provided. It supports win2k All version and IMail 8.01-11. The exploit uses the strcpy function to copy a buffer from src to dst, which can lead to a buffer overflow vulnerability. The exploit also connects back to an IP and port specified using the options. The bad characters used in the exploit are 0x00, 0x0a, and 0x25. The exploit also manipulates the PEB structure to hide its presence.

Vtiger CRM 6.3.0 – Authenticated Arbitrary File Upload

Vtiger 6.3.0 CRM's administration interface allows for the upload of a company logo. Instead of uploading an image, an attacker may choose to upload a file containing PHP code and run this code by accessing the resulting PHP file. This module was tested against vTiger CRM v6.3.0.

Advantech WebAccess < 8.1 webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow RCE

This exploit allows remote code execution on Advantech WebAccess version 8.0-2015.08.16. It takes advantage of a stack-based buffer overflow vulnerability in the DrawSrv.dll file. By sending a specially crafted request to the target system, an attacker can execute arbitrary code.

WP Security Audit Log Plugin, Sensitive Information Disclosure <= 3.1.1

No protection on the wp-content/uploads/wp-security-audit-log/* which is indexed by google and allows for attackers to possibly find user information (bad login attempts)

Recent Exploits: