header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WSO2 3.1.0 – Persistent Cross-Site Scripting

A remote Stored Cross Site Scripting has been discovered in WSO2 API Manager Ressource Browser component). The security vulnerability allows a remote attacker With access to the component "Ressource Browser" to inject a malicious code in Add Comment Feature. The vulnerability is triggered after sending a POST request to `/carbon/info/comment-ajaxprocessor.jsp` with Parameter "comment=targeted&path=%2F". Remote attackers has the ablility to spread a malware,to Hijack a session (a session with Higher privileges), or to initiate phishing attacks. The security risk of the Stored XSS web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 5.4 Exploitation of the Stored XSS web vulnerability requires a low privilege web-application user account and medium or high user interaction. Successful exploitation of the vulnerability results in Compromising the server.

WordPress Plugin Media Library Assistant 2.81 – Local File Inclusion

There is a file inclusion vulnerability in the mla-file-downloader.php file. Visiting the vulnerable URL would lead to disclosure of the contents of options.php. Note that this vulnerability does not require authentication.

Free Desktop Clock x86 Venetian Blinds Zipper 3.0 – Unicode Stack Overflow (SEH)

This exploit targets a stack overflow vulnerability in the Free Desktop Clock application, version 3.0. By manipulating the 'Enter display name' textbox, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program's execution flow. The exploit uses the Venetian Blinds technique to decode the attacker's shellcode. The vulnerability only affects the x86 version of the application and has been tested on Windows 10 - Pro 1909 (x86) and Home 1909 (x86).

AbsoluteTelnet 11.12 – ‘SSH1/username’ Denial of Service (PoC)

The AbsoluteTelnet version 11.12 is vulnerable to a denial of service (DoS) attack. By sending a specially crafted payload to the SSH1 'username' field, an attacker can cause the application to crash, resulting in a denial of service condition.

Microsoft NET USE win10 – Insufficient Authentication Logic

The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.In contrast authenticating using the "unc path" "\x.x.x.xc$" using an explorer type logon does prompt for credentials as expected. The authentication mechanism between the two network logon methods are inconsistent and in my opinion leaves an authentication loophole invitation. Moreover, since this targets built-in Administrator account, one would think there would be more or equal security measures in place not less.Requirements:1) Remote system built-in Administrator account is enabled2) Origination system users account password and the remote system Administrator passwords match (reuse).Typically, to gain Admin privileges on remote logon you may have to create and enable "LocalAccountTokenFilterPolicy" but NOT in this case.Again, the "LocalAccountT

Vesta Control Panel Authenticated Remote Code Execution

This module exploits command injection vulnerability in v-list-user-backups bash script file. Low privileged authenticated users can execute arbitrary commands under the context of the root user. An authenticated attacker with a low privileges can inject a payload in the file name starts with dot. During the user backup process, this file name will be evaluated by the v-user-backup bash scripts. As result of that backup process, when an attacker try to list existing backups injected payload will be executed.

Recent Exploits: