header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Express Accounts Accounting 7.02 – Persistent Cross-Site Scripting

Express Accounts Accounting v7.02 is vulnerable to Persistent Cross-Site Scripting (XSS). An authenticated unprivileged user can inject malicious payloads into the Customer field of Invoices, Sales Orders, Items, Customers, and Quotes sections. When an authenticated privileged or unprivileged user visits any of these sections, the payload will be executed.

Podman & Varlink 1.5.1 – Remote Code Execution

Podman is container engine / platform similar to Docker supported by RedHat and Fedora with Varlink being a protocol to exchange messages, which comes in handy for things like a Remote API. Depending on how Podman and Varlink are deployed, they can be susceptible to local and remote attacks. There are a few API bugs in Podman itself, as well as a way to execute arbitary commands if one can hit Podman via the Remote API. Running Podman with Varlink over tcp listening either on localhost or the network interface is the most vulnerable setup, but other ways such as access via the local UNIX socket or over SSH (key /w no passphrase is common) aren't likely to be vulnerable unless ACLs or other stuff is broken.

Ajenti 2.1.31 – Remote Code Execution

Ajenti is a web control panel written in Python and AngularJS. One can locally monitor executed commands on the server while testing. Modified the JSON request username value to be `id` which allows for remote code execution. Tested Ajenti 2.1.31 on Ubuntu 18.04, fixed in 2.1.32.

Express Invoice 7.12 – ‘Customer’ Persistent Cross-Site Scripting

An authenticated unprivileged user can inject malicious JavaScript code into the 'Customer' field of the Invoices, Items, Customers, and Quotes sections of Express Invoice v7.12. When an authenticated privileged or unprivileged user visits any of these sections, the malicious code will be executed.

Windows Kernel Crash in memcpy()

We have encountered a Windows kernel crash in memcpy() called by nt!MiRelocateImage while trying to load a malformed PE image into the process address space as a data file (i.e. LoadLibraryEx(LOAD_LIBRARY_AS_DATAFILE | LOAD_LIBRARY_AS_IMAGE_RESOURCE)). An example crash log generated after triggering the bug is shown below.

TP-Link TL-WR1043ND 2 – Authentication Bypass

A vulnerability in TP-Link TL-WR1043ND V2 routers allows an attacker to bypass authentication and gain access to the router's web interface. This is due to the router's web interface not properly validating the Authorization header. An attacker can send a specially crafted HTTP request with a valid Authorization header to gain access to the router's web interface.

Recent Exploits: