Get Simple CMS version 3.3.3 suffers from information disclosure, upload, and cross site scripting vulnerabilities.
cbbfcd1ffbd19b40f68a09bc3831b08a98ed0e3a45c608112c9f9cce82a3a2ef
PayPal Community Web Portal suffered from cross site scripting vulnerabilities.
66eac32c73b32b474e784bbd86e55d93ac7e0620b25e7cf309f01b0e26ef0773
Malicious script code could be inserted into PayPal's mail encoding functionality.
ed363ae648c831c78fce7311c71efe723fd447f58dd5e7d30215423e85dfa3a5
POSNIC version 1.02 suffers from directory listing and file upload exposure vulnerabilities.
ca1313a59105d7e4fb14cfff488765f623bb0fbcd07ff8b06039cfb663615a8d
This Metasploit module exploits a code injection in specially crafted environment variables in Bash, specifically targeting Apache mod_cgi scripts through the HTTP_USER_AGENT variable.
bddccc35d3cda611c86307a7ce0074fc7d74f100f9a6dea0b6e39a478138e054
This Metasploit module exploits a code injection in specially crafted environment variables in Bash, specifically targeting dhclient network configuration scripts through the HOSTNAME, DOMAINNAME, and URL DHCP options.
79d7a8dc657f6596bbdf6d89daca73b5c6faa99cc6ea47bed9be15fb8d04a23a
GNU Bash versions 4.3 and below remote command injection exploit that leverages the REFERER header on vulnerable CGI scripts. Launches a connect-back shell. Written in Perl.
19dfcfb3d85be26b41d2f9316ffaebf7de4fe7c3b8fd4d6b1cf6a55a6f1ba395
Typo3 JobControl version 2.14.0 suffers from cross site scripting and remote SQL injection vulnerabilities. Typo3 no longer provides updates for this extension and it is considered unsafe to use.
fd26ba8328d734e82a7dea5f7dff200a5a1a0a8862c060bfd070948aa195c3db
Gnu Bash versions 4.3 and below remote command injection exploit that leverages the User-Agent header via vulnerable CGI scripts. Written in Python.
057996be27a48a42909a085ad63607f515c2c4f7a1da1dc7eddd802689cd126c
SmarterTools Smarter Track versions 6 through 10 suffer from an information disclosure vulnerability.
b41e89efc3bbbdee6f8f96f9d1f50dd467ded58b5ee3d8c3c7c09b0cfc00832f
GS Foto Uebertraege version 3.0 suffers from a local file inclusion vulnerabilities.
94fa4864b4a48c57985de0ba4158bbfed8cf5005eedcc0ac60d2c0633d2247ec
Nucom ADSL ADSLR5000UNv2 suffers from a remote credential disclosure vulnerability.
da83a0d2bd47f65c4b82b5e8c00ad0d11927797bb63d8dd1c8dd3f69bcaf59b1
This abuses the bug in bash environment variables (CVE-2014-6271) to get a suid binary inside of VMWare Fusion to launch our payload as root.
f04f53cef923e1ebad417dccfb1f6d01ee754b3ddac0ef16fcb609fa3f055392
A stack overflow was discovered when serializing data via the Data::Dumper extension which is part of Perl-Core. By using the "Dumper" method on a large Array-Reference which recursively contains other Array-References, it is possible to cause many recursive calls to the DD_dump native function and ultimately exhaust all available stack memory.
5739d0c214a552e16df8c1827940aaed394eeceffff1b5e158eb34f54598672a
WordPress All In One WP Security plugin version 3.8.2 suffers from multiple remote SQL injection vulnerabilities.
a719c00b89342dc8c43e26900af10153fcbe37cf3ff5a29d9e9d752b29e03e85
bashedCgi is a quick and dirty Metasploit module to send the BASH exploit payload (CVE-2014-6271) to CGI scripts that are BASH-based or invoke BASH, to execute an arbitrary shell command.
917183304ff31e505f18d434fcc284d5fe270c928e0cc5e96231c14eabb1aae3
ZyXEL Prestig P-660HNU-T1v2 suffers from a remote credential disclosure vulnerability.
a11b0844b499c1a56ff865d40ff31c2d6190bd5310c1872b46386cd82ef5acd9
Due to a processing issue with environment variables it is possible to leverage bash for command execution through various methodologies.
10416de1b992e9a1adc732bd402d4760e0a76f5de17bf16ba8456967dcec154b
Bash specially-crafted environment variable code injection proof of concept exploit that inserts the malicious payload into a User-Agent header and looks for a 500 response on a web server.
1273ee8212b97a8ecaf568588e84bc96f969eba4ff5386e89d28e7453e106454
CMS AutoWeb version 3.0 suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
279b5425a6bff2252c116322d11992c4e67a38e00cc18241d49877aabe59a709
WS10 Data Server version 1.83 SCADA buffer overflow proof of concept exploit.
a227c39064e66149b2e0e4bb39e15019fc146303af1110afbb8c02a974620e7d
5pmweb.com suffers from a cross site scripting vulnerability.
44c1d53849693014d71a3e5d067e1538fe075a9353af17787fab810787c01387
insight.ly suffers from a cross site scripting vulnerability.
7ccce86db3bea6965352f61c8695bcf45a7677abaa9756f4f9de035bd34465c9
This Metasploit module exploits a flaw within the Device Manager (rrobtd.exe). When parsing the 0x75 command, the process does not properly filter user supplied input allowing for arbitrary command injection. This Metasploit module has been tested successfully on EMC AlphaStor 4.0 build 116 with Windows 2003 SP2 and Windows 2008 R2.
3e993a7e854efa86fb910cf5ae6005aed96bf8fef7a6b5ff28fe00ff12003031
This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.
2c87a396ae651d2548218234d6c075460d07bc9f8c985df84efe8276828e073e