Xelenonz

5 exploits Active since Jul 2012
CVE-2015-2208 NOMISEC WORKING POC
Avinu Phpmoadmin - Command Injection
The saveObject function in moadmin.php in phpMoAdmin 1.1.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the object parameter.
2 stars
CVE-2012-4054 EXPLOITDB ruby WORKING POC
Cpe17 Autorun Killer < 1.7.1 - Memory Corruption
Buffer overflow in the readfile function in CPE17 Autorun Killer 1.7.1 and earlier allows physically proximate attackers to execute arbitrary code via a crafted inf file.
EIP-2026-113380 EXPLOITDB text WRITEUP
Webthaiapp - 'detail.php?cat' Blind SQL Injection
CVE-2015-2208 EXPLOITDB text WORKING POC
Avinu Phpmoadmin - Command Injection
The saveObject function in moadmin.php in phpMoAdmin 1.1.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the object parameter.
CVE-2014-1610 EXPLOITDB text WORKING POC
MediaWiki <1.22.2/<1.21.5/<1.19.11 - RCE
MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.