header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

XSRF Stored FlySpray 1.0-rc4 (XSS2CSRF add admin account)

A vulnerability has been discovered in Flyspray, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed via the 'real_name' parameter to '/index.php?do=myprofile' is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. The script is executed on the parameter page and on any page that allows the user to put a comment. This XSS vector allows executing scripts to gather the CSRF token and submit a form to create a new admin.

SquirrelMail <= 1.4.23 Remote Code Execution PoC Exploit (CVE-2017-7692)

This is a quick and messy Proof of Concept (PoC) exploit for the SquirrelMail webmail application. It contains payloads for two vectors: File Write and Remote Code Execution (RCE). It requires user credentials and that SquirrelMail uses Sendmail method as email delivery transport.

VirtualBox Privilege Escalation

This exploit allows an unprivileged userspace process to escalate into the VirtualBox process, compromising the host kernel. It takes advantage of the loading of arbitrary shared libraries via dlopen() in the libasound library, which is loaded by the privileged VM host process for VMs with ALSA audio.

Vulnerability in VirtualBox

There is a vulnerability in VirtualBox that permits an attacker with root privileges in a virtual machine with a NAT network interface to corrupt the memory of the userspace host process and leak memory contents from the userspace host process. This probably permits an attacker with root privileges inside the guest to execute arbitrary code in userspace context on the host.

Data Dynamics ActiveBar ActiveX Control (actbar3.ocx <= 3.1) Multiple Insecure Methods

The exploit overwrites the system.ini file. It is advised to make a copy of the file before running the exploit to avoid any damage. The control is marked as RegKey Safe for Script: True, RegKey Safe for Init: True, Implements IObjectSafety: False, KillBitSet: False.

Dmitry(Deepmagic Information Gathering Tool) Local Stack Buffer Overflow

Buffer overflow in DMitry (Deepmagic Information Gathering Tool) version 1.3a (Unix) allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long argument. An example threat model is automated execution of DMitry with hostname strings found in local log files.

Huawei HG532n Command Injection

This module exploits a command injection vulnerability in the Huawei HG532n routers provided by TE-Data Egypt, leading to a root shell. The router's web interface has two kinds of logins, a 'limited' user:user login given to all customers and an admin mode. The limited mode is used here to expose the router's telnet port to the outside world through NAT port-forwarding. With telnet now remotely accessible, the router's limited 'ATP command line tool' (served over telnet) can be upgraded to a root shell through an injection into the ATP's hidden 'ping' command.

Recent Exploits: