Vulnerability & Exploit Database

Displaying module details 31 - 40 of 3181 in total

Jenkins CLI RMI Java Deserialization Vulnerability Exploit

Disclosed: November 18, 2015

This module exploits a vulnerability in Jenkins. An unsafe deserialization bug exists on the Jenkins master, which allows remote arbitrary code execution. Authentication is not required to exploit this vulnerability.

Redis File Upload Exploit

Disclosed: November 11, 2015

This module can be used to leverage functionality exposed by Redis to achieve somewhat arbitrary file upload to a file and directory to which the user account running the redis instance has access. It is not totally arbitrary because the exact contents of the file cannot be completely controlled given the...

Oracle BeeHive 2 voice-servlet prepareAudioToPlay() Arbitrary File Upload Exploit

Disclosed: November 10, 2015

This module exploits a vulnerability found in Oracle BeeHive. The prepareAudioToPlay method found in voice-servlet can be abused to write a malicious file onto the target machine, and gain remote arbitrary code execution under the context of SYSTEM. Authentication is not required to exploit this vulnerability.

vBulletin 5.1.2 Unserialize Code Execution Exploit

Disclosed: November 04, 2015

This module exploits a PHP object injection vulnerability in vBulletin 5.1.2 to 5.1.9

Atlassian HipChat for Jira Plugin Velocity Template Injection Exploit

Disclosed: October 28, 2015

Atlassian Hipchat is a web service for internal instant messaging. A plugin is available for Jira that allows team collibration at real time. A message can be used to inject Java code into a Velocity template, and gain code exeuction as Jira. Authentication is required to exploit this vulnerability, and you must make sure...

China Chopper Caidao PHP Backdoor Code Execution Exploit

Disclosed: October 27, 2015

This module takes advantage of the China Chopper Webshell that is commonly used by Chinese hackers.

Joomla Content History SQLi Remote Code Execution Exploit

Disclosed: October 23, 2015

This module exploits a SQL injection vulnerability found in Joomla versions 3.2 up to 3.4.4. The vulnerability exists in the Content History administrator component in the core of Joomla. Triggering the SQL injection makes it possible to retrieve active Super User sessions. The cookie can be used to login to the J...

Joomla com_contenthistory Error-Based SQL Injection Exploit

Disclosed: October 22, 2015

This module exploits a SQL injection vulnerability in Joomla versions 3.2 through 3.4.4 in order to either enumerate usernames and password hashes.

Joomla Real Estate Manager Component Error-Based SQL Injection Exploit

Disclosed: October 22, 2015

This module exploits a SQL injection vulnerability in Joomla Plugin com_realestatemanager versions 3.7 in order to either enumerate usernames and password hashes.

Safari User-Assisted Applescript Exec Attack Exploit

Disclosed: October 16, 2015

In versions of Mac OS X before 10.11.1, the applescript:// URL scheme is provided, which opens the provided script in the Applescript Editor. Pressing cmd-R in the Editor executes the code without any additional confirmation from the user. By getting the user to press cmd-R in Safari, and by hooking the cmd-key ke...