header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Rundeck Community Edition before 3.0.13 Multiple Stored XSS

Cross-Site Scripting issues affecting multiple fields in the workflow module under job edit form by injecting javascript code in the Arguments, Invocation String, and File Extension field, the input from these fields are rendered in the Execution Preview which is the sink of this vulnerability.

CloudMe Sync v1.11.2 Buffer Overflow – WoW64 – (DEP Bypass)

A buffer overflow vulnerability exists in CloudMe Sync v1.11.2 due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This exploit is a port of the original exploit for CloudMe Sync v1.11.2 to WoW64. It uses a ROP chain to bypass DEP and execute shellcode.

Lua 5.3.5

During a fuzz session using 'AFL', a heap use after free vulnerability was found in lua 5.3.5. The function 'lua_upvaluejoin' in file lapi.c at line 1287 suffers from a use after free bug when supplied the same function for parameter f1 and f2 and the same upvalue index. The bug is only triggered when the upvalue is closed, as the 'luaC_upvdeccount' function found in file lgc.c at line 678 will decrement the refcount and then free the upvalue if the refcount is zero and if the upvalue is closed.

Green CMS 2.x – Arbitrary File & Directory Download

Green CMS 2.x is vulnerable to arbitrary file & directory download. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to download any file or directory from the server.

Command Injection Vulnerability in Cisco RV320 Router

The router's web interface enables users to generate new X.509 certificates directly on the device. A user may enter typical configuration parameters required for the certificate, such as organisation, the common name and so on. In order to generate the certificate, the device uses the command-line program openssl. The device's firmware uses the following format string to assemble the openssl command: 'openssl req -new -nodes -subj '/C=%s/ST=%s/L=%s/O=%s/OU=%s/CN=%s/emailAddress=%s' -keyout %s%s.key -sha256 -out %s%s.csr -days %s -newkey rsa:%s > /dev/null 2>&1'. Although the web interface filters certain special characters via JavaScript, there is actually no input filtering, escaping or encoding happening on the server. This allows attackers to inject arbitrary commands.

PostScript Subroutine Injection

PostScript is a programming language used to create documents for printing. It is vulnerable to subroutine injection, which is a type of attack that allows an attacker to inject malicious code into a subroutine. This can be done by changing the dictstack, which is similar to variable scope in other languages. This can allow an attacker to execute arbitrary code on the system, leading to a complete compromise.

AddressSanitizer (ASan) SUID Executable Privilege Escalation

This module attempts to gain root privileges on Linux systems using setuid executables compiled with AddressSanitizer (ASan). ASan configuration related environment variables are permitted when executing setuid executables built with libasan. The `log_path` option can be set using the `ASAN_OPTIONS` environment variable, allowing clobbering of arbitrary files, with the privileges of the setuid user. This module uploads a shared object and sprays symlinks to overwrite `/etc/ld.so.preload` in order to create a setuid root shell.

NBG-418N v2 Modem CSRF Exploit & PoC

This exploit allows an attacker to perform a CSRF attack on the Zyxel NBG-418N v2 Modem. The attacker can craft a malicious HTML page that contains a form with the username and password fields pre-filled with the credentials of the admin user. When the victim visits the malicious page, the form will be automatically submitted and the attacker will gain access to the modem.

Recent Exploits: