header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RouterOS Remote Rooting

By the Way is an exploit coded in C++ that enables a root shell on Mikrotik devices running RouterOS versions: Longterm: 6.30.1 - 6.40.7 Stable: 6.29 - 6.42 Beta: 6.29rc1 - 6.43rc3. The exploit leverages the path traversal vulnerability CVE-2018-14847 to extract the admin password and create an 'option' package to enable the developer backdoor. Post exploitation the attacker can connect to Telnet or SSH using the root user 'devel' with the admin's password.

Ektron CMS 9.20 SP2 Remote Code Execution Vulnerability

Ektron CMS 9.20 SP2 allows remote attackers to call aspx pages via the "activateuser.aspx" page, even if a page is located under the /WorkArea/ path, which is forbidden (normally available exclusively for local admins). Pre-requisites: curl command deployed (Windows or Linux) and Burpsuite Free/Pro deployed or any other WebProxy to catch/send GET request.

FileZilla 3.33 Buffer-Overflow (PoC)

A buffer overflow vulnerability exists in FileZilla 3.33, which could allow an attacker to execute arbitrary code on the target system. The vulnerability is due to a lack of proper validation of user-supplied input when handling FTP commands. An attacker can exploit this vulnerability by sending a specially crafted FTP command to the target system. Successful exploitation of this vulnerability could result in arbitrary code execution on the target system.

Bypassing BailOutOnInvalidatedArrayHeadSegment Check

The BailOutOnInvalidatedArrayHeadSegment check uses the JavascriptArray::GetArrayForArrayOrObjectWithArray method to check whether the given object is an array. Since wrapping an object with the CrossSite class replaces the vtable of the object, this can be used to bypass it. The PoC code shows how an attacker can use this vulnerability to bypass the BailOutOnInvalidatedArrayHeadSegment check and perform in-place type conversion.

Unitrends UEB http api remote code execution

It was discovered that the api/storage web interface in Unitrends Backup (UB) before 10.0.0 has an issue in which one of its input parameters was not validated. A remote attacker could use this flaw to bypass authentication and execute arbitrary commands with root privilege on the target system. UEB v9 runs the api under root privileges and api/storage is vulnerable. UEB v10 runs the api under limited privileges and api/hosts is vulnerable.

Android sdcardfs Vulnerability

Android used to use a FUSE filesystem to emulate external storage, but nowadays an in-kernel filesystem called 'sdcardfs' is used instead. In sdcardfs_create() and sdcardfs_mkdir(), the following code is used to temporarily override the umask while calling into the lower filesystem: 'temporarily change umask for lower fs write', however, this is wrong and the umask should be restored before calling into the lower filesystem.

Recent Exploits: