header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Race Condition/Object Lifetime Issue in Browser Process

There is a race condition/object lifetime issue in the browser process when the browser process shutdown races against the IO thread handling mojo messages from the renderer. It can be triggered by closing the browser while running the attached proof of concept (poc). The issue may also occur when the Chrome auto-update causes a browser restart in the background.

KB-Bestellsystem Perl Domain Order System Shell Metacharacter Filtering Bypass

"KB-Bestellsystem" is a domain order system written in Perl. The "domain" and "tld" parameters in "kb_whois.cgi" are not filtering shell metacharacters. The following examples will show you the /etc/passwd file:http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=;cat%20/etc/passwd;&tld=.com&tarrif=http://targethost.com/kb-bestellsystem/kb_whois.cgi?action=check_owner&domain=google&tld=.com;cat /etc/passwd;&tarrif=<< Greetz Zero X >>

Usermin 1.750 – Remote Command Execution

This module exploits an arbitrary command execution vulnerability in Usermin 1.750 and lower versions. Any user authorized to the "Java file manager" and "Upload and Download" fields can execute arbitrary commands with root privileges. The vulnerability is dangerous as Usermin is the most shared interface with users. The module has been tested successfully with Usermin 1.750 over Debian 4.9.18.

Advance Gift Shop Pro Script 2.0.3 – SQL Injection

The Advance Gift Shop Pro Script version 2.0.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL code into the 's' parameter of the search functionality. This can lead to unauthorized access, data leakage, and potential manipulation of the database.

Micro Focus Filr Multiple Vulnerabilities

A vulnerability was found in the Micro Focus Filr Appliance, which would allow an attacker with regular user access to read arbitrary files of the filesystem. Furthermore, a vulnerability in the famtd daemon could allow a local attacker to elevate privileges.

Nuuo Central Management Authenticated SQL Server SQLi

The Nuuo Central Management Server allows an authenticated user to query the state of the alarms. This functionality can be abused to inject SQL into the query. As SQL Server 2005 Express is installed by default, xp_cmdshell can be enabled and abused to achieve code execution. This module will either use a provided session number (which can be guessed with an auxiliary module) or attempt to login using a provided username and password - it will also try the default credentials if nothing is provided.

Mismatch between property value and attributes in WebKit

In WebKit, there is a vulnerability where a mismatch can occur between the value of a property and its attributes. This can lead to a type confusion vulnerability. When handling a property access operation, the normal interpreter sees the type of the value whereas the JIT compiler sees the attributes. This can potentially be exploited by an attacker to execute arbitrary code or gain unauthorized access.

Recent Exploits: