header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! Component GMapFP 3.30 – Arbitrary File Upload

The Joomla Gmapfp Components 3.x is allowing remote attackers to upload arbitrary files upload/shell upload due to the issues of unrestricted file uploads. An attacker can bypass the restriction by uploading files with double extensions such as file.php.png, file2.php.jpeg, file3.html.jpg, and file3.txt.jpg. The uploaded files can be accessed via the directory path http://127.0.0.1/images/gmapfp/file.php or http://127.0.0.1//images/gmapfp/file.php.png.

UliCMS 2020.1 – Persistent Cross-Site Scripting

A stored cross-site-scripting security issue in the save page feature was discovered in UliCMS 2020.1. An attacker can exploit this vulnerability by sending a malicious POST request to the vulnerable URL with a payload in the 'content' parameter. This will allow the attacker to execute arbitrary JavaScript code in the context of the vulnerable website.

rConfig 3.9.4 – ‘search.crud.php’ Remote Command Injection

rConfig 3.9.4 is vulnerable to a remote command injection vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious payload to the 'search.crud.php' page via the 'nodeId' parameter. This will allow the attacker to execute arbitrary commands on the vulnerable system.

FIBARO System Home Center 5.021 – Remote File Include

The smart home solution is vulnerable to a remote Cross-Site Scripting triggered via a Remote File Inclusion issue by including arbitrary client-side dynamic scripts (JavaScript, VBScript) due to the undocumented proxy API and its url GET parameter. This allows hijacking the current session of the user or changing the look of the page by changing the HTML.

Google Chrome 80.0.3987.87 – Heap-Corruption Remote Denial of Service (PoC)

A vulnerability in Google Chrome 80.0.3987.87 allows a remote attacker to cause a denial of service (DoS) condition by exploiting a heap-corruption vulnerability. The vulnerability is due to improper validation of user-supplied input by the affected software. An attacker can exploit this vulnerability by sending a specially crafted request to the affected software. Successful exploitation of this vulnerability could allow an attacker to cause a denial of service condition.

ProficySCADA for iOS 5.0.25920 – ‘Password’ Denial of Service (PoC)

A denial of service vulnerability exists in ProficySCADA for iOS 5.0.25920 when an attacker sends a specially crafted payload of 257 'A' characters to the 'Password' field, causing the application to crash.

VMware Fusion 11.5.2 – Privilege Escalation

A privilege escalation vulnerability exists in VMware Fusion 11.5.1 and 11.5.2 that allows an attacker to gain root privileges on the host system. The vulnerability is due to the insecure handling of the Open VMware USB Arbitrator Service. An attacker can exploit this vulnerability by creating a malicious service in the ~/Contents/Library/services directory and then linking it to the ~/a/b/c directory. The malicious service will then be executed when the Open VMware USB Arbitrator Service is started. This will allow the attacker to gain root privileges on the host system.

Local Privilege Escalation via VMWare Fusion

A directory traversal vulnerability in VMware Fusion's SUID binaries can allow an attacker to run commands as the root user. The vulnerability is a directory traversal bug inside of VMware Fusion. Several of the programs included in VMware Fusion rely on the their path on disk to find other libraries, helper utilities, and service daemons. Two such instances of this code pattern in SUID programs can be found in the 'Open VMware Fusion Services' executable and the 'Open VMware USB Arbitrator Service' executable. These programs try to open the service programs by looking for the files: Open VMware Fusion Services: $DIRECTORY_WITH_SUID_EXECUTABLE/../../../Contents/Library/services/VMware Fusion Services Open VMware USB Arbitrator Service: $DIRECTORY_WITH_SUID_EXECUTABLE/../../../Contents/Library/services/VMware USB Arbitrator Service While ordinarily this is fine, as any attempt to copy the programs will not copy the SUID ownership of the file and any attempt to the move the programs will fail without root access. Furthermore symbolic links will not trick the programs into using the new location. However, on macOS unprivileged users can create hard links to SUID executables, which will trick the programs. Thus, by creating an adequate directory layout and hard linking to the SUDI executables, an attacker can cause the programs to open the service programs from a location under the control of the attacker.

Joomla! ACYMAILING 3.9.0 component – Unauthenticated Arbitrary File Upload

Vulnerable code is in MailsController::setNewIconShare() in file 'back/controllers/mails.php'. There is no checking CSRF token, no sanitizing, and authentication. An attacker can upload arbitrary files to the server without authentication.

Microtik SSH Daemon 6.44.3 – Denial of Service (PoC)

An uncontrolled resource consumption vulnerability in SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections with SIGPIPE signal and cause a reboot via connect and write system calls because of uncontrolled resource management.

Recent Exploits: