header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Exchange 2019 – Unauthenticated Email Download (Metasploit)

This module scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855). By chaining this bug with another post-auth arbitrary-file-write vulnerability to get code execution (CVE-2021-27065). As a result, an unauthenticated attacker can execute arbitrary commands on Microsoft Exchange Server.

WordPress Plugin WP Statistics 13.0.7 – Time-Based Blind SQL Injection (Unauthenticated)

WordPress Plugin WP Statistics 13.0.7 is vulnerable to Time-Based Blind SQL Injection (Unauthenticated). An attacker can exploit this vulnerability to gain access to the database of the website. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'ID' parameter of the 'wp-admin/admin.php' page. An attacker can send a specially crafted request to the vulnerable page and inject malicious SQL queries to gain access to the database. The vulnerability affects versions 13.0 to 13.0.7 of the plugin. The patch for this vulnerability is available in version 13.0.8 of the plugin.

Mozilla Firefox 88.0.1 – File Extension Execution of Arbitrary Code

A vulnerability has been identified in the way Mozilla Firefox handles downloaded files on Windows. Unlike the other most used browsers (Google Chrome, Internet Explorer, Edge), the action Mozilla Firefox takes is based on the 'Content-Type' attribute. It is possible to 'confuse' Firefox using a combination of 'Content-Type' attribute and file extension which leads to the arbitrary execution of code. Specifically, if a server responds with a 'Content-Type: text/html' and a filename that has the extension '.jpg', Mozilla Firefox will show the end user an 'open-with' mask, asking to open the jpg file with the default program (usually a browser), but will download the above mentioned file into the system's temporary folder using the extension '.html'. Subsequently, the downloaded file will be opened using the default program for .html files (browsers). It is easy to understand that it is possible to create a fake image, containing JavaScript code, which will lead to the execution of the code itself.

Spotweb 1.4.9 – DOM Based Cross-Site Scripting (XSS)

A DOM based XSS vulnerability exists in Spotweb 1.4.9. An attacker can exploit this vulnerability by tricking an authenticated user into clicking a malicious link. This can allow the attacker to execute arbitrary JavaScript code in the context of the user's browser.

Acer Updater Service 1.2.3500.0 – ‘UpdaterService.exe’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Acer Backup Manager Module 3.0.0.99 – ‘IScheduleSvc.exe’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

ASUS HID Access Service 1.0.94.0 – ‘AsHidSrv.exe’ Unquoted Service Path

ATK Hotkey 1.0.94.0 suffers from an unquoted search path issue impacting the service 'AsHidService'. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user’s code would execute with the elevated privileges of the application.

COVID19 Testing Management System 1.0 – ‘Admin name’ Cross-Site Scripting (XSS)

An attacker uses Stored XSS to inject malicious content (referred to as the payload), most often JavaScript code, into the target application. If there is no input validation, this malicious code is permanently stored (persisted) by the target application, for example within a database. When a victim opens the affected web page in a browser, the XSS attack payload is served to the victim’s browser as part of the HTML code (just like a legitimate comment would). This means that victims will end up executing the malicious script once the page is viewed in their browser.

Recent Exploits: