There is a race condition/object lifetime issue in the browser process when the browser process shutdown races against the IO thread handling mojo messages from the renderer. It can be triggered by closing the browser while running the attached proof of concept (poc). The issue may also occur when the Chrome auto-update causes a browser restart in the background.
"KB-Bestellsystem" is a domain order system written in Perl. The "domain" and "tld" parameters in "kb_whois.cgi" are not filtering shell metacharacters. The following examples will show you the /etc/passwd file:http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=;cat%20/etc/passwd;&tld=.com&tarrif=http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=google&tld=.com;cat /etc/passwd;&tarrif=<< Greetz Zero X >>
The exploit takes advantage of CVE-2018-10561 and its extension to execute remote code on a GPON ONT device. It can be used after successful authentication, with 'useradmin' permission being sufficient. The exploit also supports IP spoofing.
This module exploits an arbitrary command execution vulnerability in Usermin 1.750 and lower versions. Any user authorized to the "Java file manager" and "Upload and Download" fields can execute arbitrary commands with root privileges. The vulnerability is dangerous as Usermin is the most shared interface with users. The module has been tested successfully with Usermin 1.750 over Debian 4.9.18.
This exploit targets Xlight FTP Server version 3.9.1 and allows for a SEH (Structured Exception Handling) overwrite.
The Advance Gift Shop Pro Script version 2.0.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL code into the 's' parameter of the search functionality. This can lead to unauthorized access, data leakage, and potential manipulation of the database.
A vulnerability was found in the Micro Focus Filr Appliance, which would allow an attacker with regular user access to read arbitrary files of the filesystem. Furthermore, a vulnerability in the famtd daemon could allow a local attacker to elevate privileges.
The vulnerability allows an attacker to view admin user and MD5 password, which can be cracked.
The Nuuo Central Management Server allows an authenticated user to query the state of the alarms. This functionality can be abused to inject SQL into the query. As SQL Server 2005 Express is installed by default, xp_cmdshell can be enabled and abused to achieve code execution. This module will either use a provided session number (which can be guessed with an auxiliary module) or attempt to login using a provided username and password - it will also try the default credentials if nothing is provided.
In WebKit, there is a vulnerability where a mismatch can occur between the value of a property and its attributes. This can lead to a type confusion vulnerability. When handling a property access operation, the normal interpreter sees the type of the value whereas the JIT compiler sees the attributes. This can potentially be exploited by an attacker to execute arbitrary code or gain unauthorized access.