header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ubuntu’s aufs kernel patch

Ubuntu's aufs kernel patch includes a change which allows fput() to be called on the current value of vma->vm_file instead of the saved file pointer. This matters if the ->mmap() handler replaces ->vm_file before returning an error code. To demonstrate the issue, the PoC below mounts a shiftfs that is backed by a FUSE filesystem with the FUSE flag FOPEN_DIRECT_IO, which causes fuse_file_mmap() to bail out with -ENODEV if MAP_SHARED is set.

WordPress URL Manipulation Vulnerability

WordPress websites are vulnerable to URL manipulation attacks, which can be used to leak secret content. This can be done by adding '?static=1' to a WordPress URL and manipulating the returned entries by using 'order' with 'asc' or 'desc', 'orderby', and 'm' with 'm=YYYY', 'm=YYYYMM' or 'm=YYYYMMDD' date format.

Cisco Prime Infrastructure Health Monitor HA TarArchive Directory Traversal Remote Code Execution Vulnerability

A vulnerability in the Health Monitor component of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system with root privileges. The vulnerability is due to improper validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system with root privileges.

Centova Cast 3.2.12 – Denial of Service (PoC)

The Centova Cast becomes out of control and causes 100% CPU load on all cores. A bash script is used to exploit the vulnerability by sending a request to the API with a filename of /dev/zero, which causes the Centova Cast to become out of control and cause 100% CPU load on all cores.

ipPulse 1.92 – ‘Enter Key’ Denial of Service (PoC)

A buffer overflow vulnerability exists in ipPulse 1.92 when a maliciously crafted input is sent to the 'Enter Key' field. An attacker can exploit this vulnerability to cause a denial of service condition. This can be exploited by running a python code to create a text file containing a 256 byte long string of 'A' characters, copying the content of the text file to the clipboard, clicking on 'Enter Key' in ipPulse.exe, pasting the clipboard content into the 'Name:' field, and clicking 'OK'. This will cause the application to crash.

Emerson PAC Machine Edition 9.70 Build 8595 – ‘FxControlRuntime’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Shrew Soft VPN Client 2.2.2 – ‘iked’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the appliaction.

Xfilesharing 2.5.1 – Arbitrary File Upload

A form with action http://xyz.com/cgi-bin/up.cgi and method post and enctype multipart/form-data is used to upload a file. The sid value is set to joe. The uploaded file can be included using http://xyz.com/?op=page&tmpl=../../admin_settings. The .html extension is hard coded on the server so the included file must be with html extension anywhere on the server. The LFI can be merged with Arbitrary File Upload vulnerability by uploading an html file i.e. upload.html and changing the sid to ../../../../../../tmp and so the file gets uploaded in tmp directory of the server. The Xfilesharing script has builtin shortcodes as well so RCE can be achieved by including them in the upload.html file.

Recent Exploits: