header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sitecore.Net 8.1 – Directory Traversal

An issue was discovered in Sitecore CMS that affects at least 'Sitecore.NET 8.1' rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a 'sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file=' URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack.

Subrion CMS- 4.2.1 XSS (Using component with known Vulnerability)

An XSS vulnerability exists in Subrion CMS version 4.2.1 due to improper validation of user-supplied input. An attacker can exploit this vulnerability by creating a file with XSS payload, saving it with .html extension, and uploading it via CKEditor manager and executing the file.html.

FortiDriver Local Privilege Escalation

FortiDriver is a kernel-mode driver installed with FortiClient, a security suite developed by Fortinet. A vulnerability in FortiDriver allows an attacker to gain elevated privileges on the system. The vulnerability exists due to the driver not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted IOCTL request to the driver. This can allow the attacker to gain elevated privileges on the system.

Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation

This module attempts to gain root privileges on Linux systems by abusing UDP Fragmentation Offload (UFO). This exploit targets only systems using Ubuntu (Trusty / Xenial) kernels 4.4.0-21 <= 4.4.0-89 and 4.8.0-34 <= 4.8.0-58, including Linux distros based on Ubuntu, such as Linux Mint. The target system must have unprivileged user namespaces enabled and SMAP disabled. Bypasses for SMEP and KASLR are included. Failed exploitation may crash the kernel. This module has been tested successfully on various Ubuntu and Linux Mint systems, including: Ubuntu 14.04.5 4.4.0-31-generic x64 Desktop; Ubuntu 16.04 4.8.0-53-generic; Linux Mint 17.3 4.4.0-89-generic; Linux Mint 18 4.8.0-58-generic

Out-of-Band XXE in Plex Media Server’s SSDP Processing

The XML parsing engine for Plex Media Server's SSDP/UPNP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Unauthenticated attackers on the same LAN can use this vulnerability to access arbitrary files from the filesystem with the same permission as the user account running Plex, initiate SMB connections to capture NetNTLM challenge/response and crack to clear-text password, and initiate SMB connections to relay NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.

Out-of-Band XXE in Vuze Bittorrent Client’s SSDP Processing

The XML parsing engine for Vuze Bittorrent Client's SSDP/UPNP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Unauthenticated attackers on the same LAN can use this vulnerability to access arbitrary files from the filesystem with the same permission as the user account running Vuze, initiate SMB connections to capture NetNTLM challenge/response and crack to clear-text password, and initiate SMB connections to relay NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.

PHP Template Store Script- 3.0.6 – Stored XSS via Addres ,Bank Name,and A/c Holder Name

A stored cross-site scripting vulnerability exists in PHP Template Store Script 3.0.6. An attacker can inject malicious JavaScript code into the Address Line 1, Address Line 2, Bank Name, and A/C Holder Name fields of the Personal Information page, which will be executed when the victim views the page. This can be used to steal the victim's session cookie and take over their account.

Seq 4.2.476 – Authentication Bypass

This exploit is used to bypass the authentication of Seq 4.2.476 and below versions. It uses a PUT request to the '/api/settings/setting-isauthenticationenabled' endpoint with a payload of {'Name':'isauthenticationenabled','Value':false,'Id':'setting-isauthenticationenabled','Links':{'Self':'api/settings/setting-isauthenticationenabled','Group':'api/settings/resources'}}. If the request is successful, the authentication is bypassed.

Recent Exploits: