header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple Unauthenticated Directory Traversal

The unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request to the /webmail/client/skins/default/css/css.php. Directory Traversal is a vulnerability which allows attackers to access restricted directories and execute commands outside of the web server's root directory.

Integer Overflow in Computing the Required Allocation Size When Instantiating a New Javascript Object

By supplying a long prototype chain of objects with a large expected_nof_properties, an attacker can control the resulting value of instance_size by causing (requested_embedder_fields + requested_in_object_properties) << kPointerSizeLog2 to be overflown to a small negative value, resulting in an allocation smaller than header size.

Windows Kernel Vulnerability

A Use-After-Free vulnerability exists in the Windows kernel due to improper handling of certain memory operations. An attacker can exploit this vulnerability by sending a specially crafted request to the kernel, which can lead to arbitrary code execution in the context of the kernel. This vulnerability affects Windows versions prior to Windows 10.

Sending and Retrieving Commands on GPON Routers

This exploit allows an attacker to send and retrieve commands on GPON routers. The exploit sends the commands with two modes backtick (`) and semicolon (;) because different models trigger on different devices. The attacker then waits for 3 seconds and retrieves the output from the diag.html page.

PoC command injection in BLE service of Norton Core Secure WiFi Router (CVE-2018-5234)

This exploit is a proof-of-concept (PoC) command injection in the BLE service of Norton Core Secure WiFi Router. The exploit is demonstrated by using OS GNU/Linux, Bluetooth dongle adapter, and BlueZ utility. The exploit requires restarting the router to provide access to the engineering page, and then executing the PoC script as the root user with the command to be executed as an argument. After the script is successfully executed, the attacker can gain access to the device via SSH connection with root as the user and admin as the password.

Recent Exploits: