header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ASUS DSL-N12E_C1 1.1.2.3_345 – Remote Command Execution

A vulnerability in ASUS DSL-N12E_C1 1.1.2.3_345 allows an attacker to execute arbitrary commands on the device by sending a specially crafted HTTP request. The vulnerability exists due to insufficient validation of user-supplied input in the ‘cmdMethod’ parameter of the ‘Main_Analysis_Content.asp’ page. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable device. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the vulnerable device.

Out-of-Band XXE in Universal Media Server’s SSDP Processing

The XML parsing engine for Universal Media Server's SSDP/UPNP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Unauthenticated attackers on the same LAN can use this vulnerability to access arbitrary files from the filesystem with the same permission as the user account running UMS, initiate SMB connections to capture NetNTLM challenge/response and crack to clear-text password, and initiate SMB connections to relay NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.

CoSoSys Endpoint Protector – Authenticated Remote Root Command Injection

Endpoint Protector suffers from an authenticated command injection vulnerability. By default the username and password are : root:epp2011. In the Appliance Tab, Server Maintenance the NTP Server field is vulnerable to command injection. There is a call to sh -c {NTP Server field} which is not validated. Attached is the exploit which does this automatically.

Imperva SecureSphere <= v13 - Privilege Escalation

There is a program named PCE.py which runs as root and starts a unix domain socket listener in /tmp/PCEListener. The problem is that the permissions in this socket are misconfigured. Every user on the system can interact with it. Using this exploit you can add arbritary ssh keys to authorized_keys for the admin user and login as the admin.

WityCMS 0.6.2 – Cross-Site Request Forgery (Password Change)

CSRF vulnerability in admin/user/edit in Creatiwity wityCMS 0.6.2 allows an attacker to take over a user account by modifying user's data such as email and password. To exploit this vulnerability, victim need to be logged in at target site namely victim.com and visit crafted site made by attacker namely attacker.com. Then an authenticated POST request will be generated from victim browser and it will be submit to victim.com to modify user's data to attacker desired value.

Solaris/OpenSolaris AVS kernel code execution

Sun Opensolaris <= snv_104 local kernel root exploit by mu-b - Sun 21 Dec 2008. This exploit uses a vulnerable ioctl call to gain root access. It uses the SDBC_TEST_INIT ioctl call to overwrite the syscall table and set the setuid syscall to a custom function which sets the uid to 0.

Type Confusion in H264 Packet Processing

Type confusion can occur when processing a H264 packet. In the method PacketBuffer::FindFrames in modules/video_coding/packet_buffer.cc there is a loop on line 296 that goes through the data_buffer_ vector backwards. The flag is_h264 is set before this loop, and if it is true, the loop extracts and sets h264 struct specific data in each packet of the buffer. This flag is not updated for each packet. So if a number of non-h264 packets are followed by a h264 packet, a VP8 or VP9 packet can be treated at a h264 check, allowing several bounds checks to be bypassed.

Allok Fast AVI MPEG Splitter 1.2 SEH Overwrite POC

Allok Fast AVI MPEG Splitter 1.2 is vulnerable to a SEH overwrite vulnerability. This vulnerability can be exploited by an attacker to execute arbitrary code in the context of the application. The vulnerability is triggered when a specially crafted license key is entered into the application. This causes the application to crash and allows an attacker to overwrite the SEH handler with arbitrary code.

Recent Exploits: