header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Msvod v10 has a CSRF vulnerability to change user information

Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI. A malicious website can be created with a form that contains hidden inputs for username, nickname, email, tel, password, out_time, money, is_permanent, status, and id. When the form is submitted, the user's information is changed.

LabF nfsAxe 3.7 Ping Client – Buffer Overflow (Vanilla)

A buffer overflow vulnerability exists in LabF nfsAxe 3.7 Ping Client. An attacker can exploit this vulnerability by creating a malicious payload of 220 bytes and paste it in the 'Host IP' field of the application. This will lead to the execution of arbitrary code on the vulnerable system.

Google Chrome 73.0.3683.103 V8 JavaScript Engine – Out-of-memory in invalid table size . Denial of Service (PoC)

Fatal javascript OOM in invalid table size. The vulnerability is caused by a combination of the Array constructor and the reduce() method of the Array prototype. The Array constructor is used to create an array of length 60000, and the reduce() method is used to iterate over the array. The vulnerability can be triggered by calling the Object.getOwnPropertyDescriptors() method with the array as an argument.

Contact Form Builder [CSRF → LFI]

Plugin implements the following AJAX actions: - `ContactFormMakerPreview` - `ContactFormmakerwdcaptcha` - `nopriv_ContactFormmakerwdcaptcha` - `CFMShortcode` All of them call the function `contact_form_maker_ajax`. This function dynamicaly loads a file defined in `$_GET['action']` or `$_POST['action']` if the former is not defined. Because of the way WordPress defines the AJAX action a user could define the plugin action in the `$_GET['action']` and AJAX action in `$_POST['action']`. Leveraging that and the fact that no sanitization is performed on the `$_GET['action']`, a malicious actor can perform a CSRF attack to load a file using directory traversal thus leading to Local File Inclusion vulnerability.

QNAP myQNAPcloud Connect “Username/Password” DOS

A buffer overflow vulnerability exists in QNAP myQNAPcloud Connect versions 1.3.4.0317 and below. An attacker can generate a qnap.txt file containing 1000 A characters and copy the contents of qnap.txt to the clipboard. When the contents are pasted in any username/password field (Add or Edit VPN) and the OK button is clicked, the program crashes.

XXE in Oracle Business Intelligence and XML Publisher

An XXE vulnerability exists in Oracle Business Intelligence and XML Publisher, versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0. An attacker can send a specially crafted XML request to the ReportTemplateService.xls endpoint to exploit this vulnerability. This can allow an attacker to read arbitrary files on the server.

LibreOffice Macro Code Execution

LibreOffice comes bundled with sample macros written in Python and allows the ability to bind program events to them. A macro can be tied to a program event by including the script that contains the macro and the function name to be executed. Additionally, a directory traversal vulnerability exists in the component that references the Python script to be executed. This allows a program event to execute functions from Python scripts relative to the path of the samples macros folder. The pydoc.py script included with LibreOffice contains the tempfilepager function that passes arguments to os.system, allowing RCE. This module generates an ODT file with a mouse over event that when triggered, will execute arbitrary code.

Recent Exploits: