header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unitrends Enterprise Backup bpserverd Privilege Escalation

It was discovered that the Unitrends bpserverd proprietary protocol, as exposed via xinetd, has an issue in which its authentication can be bypassed. A remote attacker could use this issue to execute arbitrary commands with root privilege on the target system. This is very similar to exploits/linux/misc/ueb9_bpserverd however it runs against the localhost by dropping a python script on the local file system. Unitrends stopped bpserverd from listening remotely on version 10.

ModuleBuilder V1.0 (file) Remote File Disclosure Vulnerability

This vulnerability allows an attacker to disclose arbitrary files on the server. By manipulating the 'file' parameter in the URL, an attacker can traverse directories and access sensitive files. In this case, the attacker is able to access the '/etc/passwd' file. This vulnerability was published on milw0rm.com on October 31, 2007.

Synaccess netBooter NP-0801DU 7.4 – Cross-Site Request Forgery (Add Admin)

The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certai actions with administrative privileges if a logged-in user visits a malicious web site.

DfMarshal Unsafe Unmarshaling Elevation of Privilege (Master)

The unmarshaler for Storage objects is completely unsafe and yet is marked as a system trusted marshaler. There are multiple ways of abusing this unmarshaler to get privilege escalation.

XMPlay 3.8.3 – ‘.m3u’ Denial of Service (PoC)

The exploit allows an attacker to crash the XMPlay media player by providing a specially crafted '.m3u' file. By launching XMPlay and either dragging the 'xmplay.m3u' file into the XMPlay window or selecting 'winamp.m3u' from the File menu, the application will crash.

Recent Exploits: