header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FlexNet Publisher 11.12.1 – Cross-Site Request Forgery (Add Local Admin)

A Cross-Site Request Forgery (CSRF) vulnerability exists in FlexNet Publisher 11.12.1 which allows an attacker to add a local admin user. An attacker can send a malicious HTTP request to the vulnerable server to add a local admin user. This can be exploited by an attacker to gain access to the vulnerable server.

rConfig 3.9.3 – Authenticated Remote Code Execution

rConfig 3.9.3 is vulnerable to authenticated remote code execution. An attacker can exploit this vulnerability by sending a malicious payload to the target server via the 'sqlQuery' parameter in the 'ajaxServerSettings.php' file. This will allow the attacker to execute arbitrary code on the target server.

Microsoft Windows Media Center WMV or WMA 6.3.9600.16384 – Code Execution

Microsoft Windows Media Center, the very popular app still used by many people, (that can play a variety of file types and originally designed for playback and recording of TV shows from TV´s cable/antenna) is affected by an issue that allows malicious people to bypass the current security standards of the app, including modern browser security standards which could ultimately lead to arbitrary code execution. The issue can be exploited through specially crafted 'wma' or 'wmv' file containing a script instruction called 'URL'. By combining these 2 issues attackers may be able to reference a local html file in the context of MS IE core, which is hosted by a Media Center 'plugin' (ehexthost32). Because usually local files are parsed in the privileged Local Machine security zone, it´s possible to run arbitrary code on the target system, because Windows Media Center´s extensibility host (ehexthost32) does not enable the security feature 'Local Machine Zone Lockdown' (FEATURE_LOCALMACHINE_LOCKDOWN). Therefore attackers might be able to compromise the target system if they can exploit an Universal Cross Site Scripting (uXSS) issue, or plant a file in a predicatable location, like the user´s 'Downloads' folder.

Centreon 19.10.5 – ‘centreontrapd’ Remote Command Execution

It is possible to get a reverse shell with a snmp trap and gain a pivot inside distributed architecture. Steps: Objective 1 : Create a SNMP trap or use linkDown OID with special command in action 3 Objective 2 : Create passive service and use App-Monitoring-Centreon-Service-Dummy Objective 3 : Assign service trap relation Objective 4 : Get centreon id reverse shell

Satellian 1.12 – Remote Code Execution

Satellian 1.12 is vulnerable to remote code execution. An attacker can send a malicious request to the server to execute arbitrary commands on the system. The attacker can use the 'libagent.cgi' endpoint to send a POST request with a malicious payload to execute arbitrary commands on the system.

Microsoft Windows 10 – Theme API ‘ThemePack’ File Parsing

Microsoft 'themepack' files are classic '.theme' files compressed for sharing over the internet. Theme files allows users to customize visual aspects of their device, such as icons for known features like 'My computer' and 'trash bin' folders, the default screensaver (which by the way allowed attackers to run '.scr' files located on shares upon applying a Theme, in the past. Refer to: CVE-2013-0810). ThemePack file type uses Microsoft 'CAB' format. The parser contains a vulnerability that allows attackers to create arbitrary files on arbitrary locations on the user´s system, by using the classic 'parent directory' technique, and thus could lead to creation of some executable files on the startup folder. This executable will be run on next logon.

Cups Easy 1.0 – Cross Site Request Forgery (Password Reset)

The Cups Easy (Purchase & Inventory) 1.0 web application is vulnerable to Cross Site Request Forgery that would allow an attacker to change the Admin password and gain unrestricted access to the site or delete any user. Proof of Concept Code for Password Change and user delete is provided in the text.

Recent Exploits: