header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FiberHome VDSL2 Modem HG 150-UB Authentication Bypass

The vulnerability exists in plain text & hard coded cookie. Using any cookie manager extension, an attacker can bypass login page by setting the following Master Cookie. Cookie: Name=0admin. Then access the homepage which will no longer require authentication. Due to improper session implementation, there is another way to bypass login. The response header of homepage without authentication looks like this. HTTP/1.1 200 Ok Server: micro_httpd Cache-Control: no-cache Date: Tue, 03 Apr 2018 18:33:12 GMT Set-Cookie: Name=; path=/ Content-Type: text/html Connection: close <html><head><script language='javascript'> parent.location='login.html' </script></head><body></body></html>HTTP/1.1 200 Ok Server: micro_httpd Cache-Control: no-cache Date: Tue, 03 Apr 2018 18:33:12 GMT Content-Type: text/html Connection: close <html> <head>.. continue to actual homepage source. The response header looks totally messed up and by triggering burp suite and modifying it to following will grant access to homepage without authentication. HTTP/1.1 200 Ok Server: micro_httpd Cache-Control: no-cache Date: Tue, 03 Apr 2018 18:33:12 GMT Set-Cookie: Name=; path=/ Content-Type: text/html Connection: close <html> <head>.. continue to actual homepage source.

Sophos Endpoint Protection – Control Panel v10.7 Insecure Crypto

Sophos endpoint protection control panel authentication uses weak unsalted unicoded cryptographic hash (SHA1) function, not using salt allows attackers that gain access to hash ability to conduct faster cracking attacks using pre-computed dictionaries, e.g. rainbow tables. This can potentially result in unauthorized access that could allow for changing of settings, whitelist or unquarantine files.

Tamper Protection Bypass

Sophos Endpoint Protection offers an enhanced tamper protection mechanism which can be bypassed by deleting the registry key "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Sophos Endpoint Defense". This allows attackers to create arbitrary registry keys or edit keys and settings under the protected ""tamper"" protection config key

GetSimple CMS 3.3.13 – Cross Site Scripting Vulnerability

Cross-site scripting (XSS) vulnerability in admin/template/js/uploadify/uploadify.swf in GetSimple CMS 3.3.13 allows remote attackers to inject arbitrary web script or HTML, as demonstrated by the movieName parameter.

Z-Blog 1.5.1.1740 Web Site physical path leakage Vulnerability

This is a WebSite physical path leakage vulnerability. The proof of concept (POC) involves visiting the following pages: http://localhost/z-blog//zb_system/admin/admin_footer.php, http://localhost/z-blog//zb_system/admin/admin_header.php, http://localhost/z-blog//zb_system/admin/admin_left.php, http://localhost/z-blog//zb_system/admin/admin_top.php, http://localhost/z-blog//zb_system/function/c_system_admin.php, http://localhost/z-blog//zb_system/function/c_system_misc.php, http://localhost/z-blog//zb_system/function/lib/category.php, http://localhost/z-blog//zb_system/function/lib/comment.php, http://localhost/z-blog//zb_system/function/lib/dbmysql.php, http://localhost/z-blog//zb_system/function/lib/dbmysqli.php, http://localhost/z-blog//zb_system/function/lib/dbpdo_mysql.php, http://localhost/z-blog//zb_system/function/lib/dbpdo_pgsql.php, http://localhost/z-blog//zb_system/function/lib/dbpdo_sqlite.php, http://localhost/z-blog//zb_system/function/lib/dbpgsql.php, http://localhost/z-blog//zb_system/function/lib/dbsqlite.php, http://localhost/z-blog//zb_system/function/lib/dbsqlite3.php, http://localhost/z-blog//zb_system/function/lib/member.php, http://localhost/z-blog//zb_system/function/lib/module.php, http://localhost/z-blog//zb_system/function/lib/networkcurl.php, http://localhost/z-blog//zb_system/function/lib/networkfile_get_contents.php, http://localhost/z-blog//zb_system/function/lib/networkfsockopen.php, http://localhost/z-blog//zb_system/function/lib/post.php, http://localhost/z-blog//zb_system/function/lib/sqlmysql.php, http://localhost/z-blog//zb_system/function/lib/sqlpgsql.php, http://localhost/z-blog//zb_system/function/lib/sqlsqlite.php, http://localhost/z-blog//zb_system/function/lib/tag.php, http://localhost/z-blog//zb_syste

Use-After-Free Issues in Array Methods in JScript

When jscript executes an Array method (such as Array.join), it first retrieves the length of an array. If the input is not an array but an object, then the length property of the object is going to be retrieved and converted to scalar. During this conversion, the "length" property is not going to be tracked by the garbage collector and the conversion to scalar causes toString()/valueOf() callbacks to be triggered. Thus, during these callbacks, the "length" property could be freed and then the freed memory can be referenced by accessing the "this" variable inside the toString()/valueOf() function.

Recent Exploits: