header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cisco (Titsco) Email Security Appliance (IronPort) C160 Header ‘Host’ Injection

This exploit allows an attacker to inject a malicious 'Host' header into a request sent to a vulnerable Cisco (Titsco) Email Security Appliance (IronPort) C160 device. This can be used to bypass authentication and gain access to the device.

WordPress Plugin WooCommerce Product Feed <= 2.2.18 - Cross-Site Scripting

The WordPress plugin 'WooCommerce Product Feed' does not correctly sanitize user-input, which leads to Cross-Site Scripting in the Admin Panel. Since it is WordPress, it's fairly easy to get RCE with this XSS, by editing the theme files via (for example) XHR requests with included Javascript.

Sentrifugo 3.2 – File Upload Restriction Bypass

Multiple File Upload Restriction Bypass vulnerabilities were found in Sentrifugo 3.2. This allows for an authenticated user to potentially obtain RCE via webshell. File upload bypass locations: /sentrifugo/index.php/mydetails/documents -- Self Service >> My Details >> Documents (any permissions needed) sentrifugo/index.php/policydocuments/add -- Organization >> Policy Documents (higher permissions needed). POC: Self Service >> My Details >> Documents >> add New Document (/sentrifugo/index.php/mydetails/documents), Turn Burp Intercept On, Select webshell with valid extension - ex: shell.php.doc, Alter request in the upload... Update 'filename' to desired extension. ex: shell.php, Change content type to 'application/x-httpd-php'.

Asus Precision TouchPad 11.0.0.25 – DoS/Privesc

A vulnerability in Asus Precision TouchPad 11.0.0.25 allows an attacker to cause a denial of service or privilege escalation by sending a specially crafted DeviceIoControl request. This vulnerability is due to insufficient input validation when handling DeviceIoControl requests. An attacker can exploit this vulnerability by sending a specially crafted DeviceIoControl request to the vulnerable driver. Successful exploitation of this vulnerability could result in denial of service or privilege escalation.

Content Provider URI Injection on Canon PRINT 2.5.5

The ContentProvider in the Canon PRINT 2.5.5 application for Android does not properly restrict data access. This allows an attacker's malicious application to obtain sensitive information including factory passwords for administrator web-interface and WPA2-PSK key. The mobile application contains unprotected exported content providers ('IJPrinterCapabilityProvider' in android/AndroidManifest.xml) that discloses sensitive application’s data under certain conditions. To securely export the content provider, one should restrict access to it by setting up android:protectionLevel or android:grantUriPermissions attributes in Android Manifest file.

SQL Server Password Changer v1.90 Denial of Service Exploit

A denial of service vulnerability exists in SQL Server Password Changer v1.90 when a maliciously crafted User Name and Registration Code is entered into the application, resulting in a crash. An attacker can exploit this vulnerability by running a python code to create a file containing 6000 bytes of 'x41' characters, copying the content of the file to the clipboard, opening SQL Server Password Changer and clicking 'EnterKey', pasting the content of the file into the 'User Name and Registration Code' field, and clicking 'OK' to trigger the crash.

Uninitialized Variable Access in WebKit

The above code is trying to inline GetByVal operations on stack-allocated arguments. The problem is, it doesn't check whether "index" is lower than "numberOfArgumentsToSkip", i.e., "index" was overflowed. This bug is exploitable as this can lead to uninitialized variable access under ceratin conditions.

Recent Exploits: