header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Linux: page->_refcount overflow via FUSE with ~140GiB RAM usage

The `_refcount` in `struct page` can be overflowed on a machine with ~140GiB of RAM or less on kernels that have commit 5da784cce4308. A FUSE request can contain up to FUSE_DEFAULT_MAX_PAGES_PER_REQ==32 page references, each consuming 16 bytes. To overflow the 32-bit `_refcount` of a page, 64GiB of kernel memory are needed as storage for such references allocated with fuse_req_pages_alloc().

Race Condition in Siemens R3964 Line Discipline Code

The Siemens R3964 line discipline code in drivers/tty/n_r3964.c has a race condition in its ioctl handler. Specifically, the handler for R3964_ENABLE_SIGNALS allocates and deletes elements in a linked list without proper locking. This vulnerability can be exploited by an unprivileged user if the line discipline is enabled in the kernel config.

Ross Video DashBoard 8.5.1 Insecure Permissions

DashBoard suffers from an elevation of privileges vulnerability which can be used by a simple authenticated user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'M' flag (Modify) or 'C' flag (Change) for 'Authenticated Users' group.

ManageEngine Applications Manager < 14.0 - Authentication Bypass / Remote Command Execution

This module exploits sqli and command injection vulnerability in the ManageEngine AM 14 and prior versions. It is completely different from the previous EDB-ID:46725 exploit. Module creates a new admin user with SQLi (MSSQL/PostgreSQL) and provides authentication bypass. Therefore an unauthenticated user can gain the authority of 'system' on the server. It uploads malicious file using the 'Execute Program Action(s)' feature of the app with the new admin account. Tested: Applications Manager 14 on Linux 64-bit (PostgreSQL) Applications Manager 14 on Windows 10 64-bit (MSSQL) Applications Manager 14 on Windows 10 64-bit (PostgreSQL) Applications Manager 13 on Windows Server 2012 R2 64-bit (MSSQL) Applications Manager 12 on Windows Server 2012 R2 64-bit (PostgreSQL)

TuMusika Evolution 1.7R5 Remote File Disclosure Vulnerability

The vulnerability allows an attacker to disclose files on the server by exploiting a flaw in the TuMusika Evolution 1.7R5 script. By manipulating the 'uri' parameter in the sc_download.php script, an attacker can traverse the file system and access sensitive files. The exploit example provided demonstrates accessing the /etc/passwd file.

Atlassian Confluence Widget Connector Macro Velocity Template Injection

Widget Connector Macro is part of Atlassian Confluence Server and Data Center that allows embed online videos, slideshows, photostreams and more directly into page. A _template parameter can be used to inject remote Java code into a Velocity template, and gain code execution. Authentication is unrequired to exploit this vulnerability. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows).Confluence before version 6.6.12, from version 6.7.0 before 6.12.3, from version 6.13.0 before 6.13.3 and from version 6.14.0 before 6.14.2 are affected.This vulnerability was originally discovered by Daniil Dmitriev.

SystemTap MODPROBE_OPTIONS Privilege Escalation

This module attempts to gain root privileges by exploiting a vulnerability in the `staprun` executable included with SystemTap version 1.3. The `staprun` executable does not clear environment variables prior to executing `modprobe`, allowing an arbitrary configuration file to be specified in the `MODPROBE_OPTIONS` environment variable, resulting in arbitrary command execution with root privileges. This module has been tested successfully on systemtap 1.2-1.fc13-i686 on Fedora 13 (i686); and systemtap 1.1-3.el5 on RHEL 5.5 (x64).

Recent Exploits: