header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NETGEAR Wireless Management System – Authentication Bypass and Privilege Escalation

The process to bypass authentication and escalate privileges is as follows: Include the '&' symbol anywhere in the password value in the login request (as raw content - it must not be encoded). After a moment, the system will accecpt the login request and return a valid session cookie. Using the valid session cookie, send a request to add a new user with administrative privileges.

Elastix <= 2.4 PHP Code Injection Exploit

Elastix is a Linux distribution that integrates the best tools available for Asterisk-based Private Branch Exchanges (PBX) into a single, easy-to-use interface. Elastix 2.4 is vulnerable to a PHP code injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted POST request to the ImportStep2.php script. This will allow the attacker to execute arbitrary PHP code on the vulnerable system.

FireEye appliance unauthorized remote root file system access

A vulnerability in FireEye appliance allows an attacker to gain unauthorized remote root file system access. This can be done by sending a malicious request to the web server, which runs as root. The malicious request contains the path to the etc/passwd file, which can be accessed and downloaded by the attacker.

Disconnect.me Mac OS X Client LPE to Root Vulnerability (0day)

The Mac OS X client of Disconnect.me has a local privilege escalation vulnerability (0day). The original download of version 2.0 or below is available at https://disconnect.me/premium/mac, and an archived download is available at http://d-h.st/LKqG. The Disconnect+Desktop.pkg has a sha256 of bc94c94c88eb5c138396519ff994ae8efe85899475f44e54f71a6ebc047ce4e7. The proof of concept involves creating a script in the /tmp directory, setting the PATH to /tmp, and running the “/Library/Application Support/disconnect/stopvpn” command, which will then run the script as root.

AutoCAD DWG and DXF To PDF Converter v2.2 Buffer Overflow

The title parameter passed into the program that specifies the title of the converted PDF is vulnerable to a buffer overflow. This can be exploited using EIP direct overwrite, SEH bypass, and ROP. EIP was easier and afforded more universal exploitation so I went that route after SEH bypass limited the exploit's universal OS compatibility

WordPress Contact Form Generator v2.0.1 and below (create/update field for contact form) CSRF and Persistent issue

A CSRF issue was found in the latest version of the plugin for wordpress 'Contact Form Generator'. The issue can be exploited by sending a special link to a wordpress administrator having installed the vulnerable plugin. form field creation: when the victim accesses the sent link, will create a new form and inject HTML / JS code without knowing. Update form field: when the victim accesses the link, will update information of the form identified for ´id´ parameter by injecting HTML / JS code.

HooToo Tripmate HT-TM01 Cross Site Request Forgery

Various functions in the device's admin web portal are vulnerable to Cross Site Request Forgery. Proof-of-concept HTML has been provided. In order for changes in wireless settings/security (executed via CSRF) to apply, a save and reset must be execute either by the admin manually saving the settings through the portal or via the save and reset CSRF-vulnerable functions described below.

Zhone ADSL2+ 4P Bridge & Router (Broadcom) – Multiple Vulnerabilities

An authentication bypass vulnerability has been discovered in the official in the official Zhone ADSL2+ 4 Port Wireless Bridge & Router (Broadcom). The vulnerability allows remote attackers to bypass the authentication procedure to compromise the hardware device or service interface.

Recent Exploits: