header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adult Script Unauthorized Administrative Access Exploit

The Adult Script software is vulnerable to unauthorized administrative access. The vulnerability can be exploited by an attacker to gain unauthorized access to the administrative panel of the software. The vulnerable code is located in the 'admin/administrator.php' file, near lines 5-8. The code checks if the 'adminid' session variable is empty and if the 'admintype' session variable is not equal to 1. If both conditions are true, the code redirects the user to the 'logout.php' page. However, there is no authentication or authorization check before this redirection, allowing an attacker to bypass the login process and gain administrative access.

Multiple Security Bugs In Hosting Controller

Multiple security bugs in Hosting Controller allow a remote attacker to gain full system administrator access. The attacker can login to the hosting controller panel, change passwords, execute commands with administrative privilege, create new users, change user profiles, perform SQL injection to access database information, manipulate credit amounts and discounts, uninstall FrontPage extensions, delete gateway information, enable or disable payment types, reveal usernames, find hosting controller setup directory, import unwanted plans, find web site path, and enable or disable forums. These vulnerabilities can be exploited by unauthorized users and users with simple accounts.

Nagios XI RCE Vulnerability

A vulnerability exists in Nagios XI <= 5.6.5 allowing an attacker to leverage an RCE to escalate privileges to root. The exploit requires access to the server as the 'nagios' user, or CCM access via the web interface with permissions to manage plugins. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes the ‘check_plugin’ executable which is owned by the nagios user A user logged into Nagios XI with permissions to modify plugins, or the 'nagios' user on the server,can modify the ‘check_plugin’ executable and insert malicious commands exectuable as root.

LibreOffice Macro Python Code Execution

LibreOffice comes bundled with sample macros written in Python and allows the ability to bind program events to them. LibreLogo is a macro that allows a program event to execute text as Python code, allowing RCE. This module generates an ODT file with a dom loaded event that, when triggered, will execute arbitrary python code and the metasploit payload.

Recent Exploits: