on

Citrix Application Delivery Controller / Gateway Remote Code Execution / Traversal

Citrix Application Delivery Controller and Citrix Gateway directory traversal remote code execution exploit.




on

Lotus Core CMS 1.0.1 Local File Inclusion

Lotus Core CMS version 1.0.1 suffers from a local file inclusion vulnerability.




on

SuiteCRM 7.11.11 Broken Access Control / Local File Inclusion

SuiteCRM versions 7.11.11 and below suffer from an add_to_prospect_list broken access control that allows for local file inclusion attacks.




on

Apache Tomcat AJP Ghostcat File Read / Inclusion

Apache Tomcat AJP Ghostcat file read and inclusion exploit.




on

FIBARO System Home Center 5.021 Remote File Inclusion / XSS

FIBARO System Home Center version 5.021 suffers from cross site scripting and remote file inclusion vulnerabilities.




on

QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation

QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code.







on

DNS Servers Filled With Wrong Kool-Aid In Romania







on

PhreeBooks ERP 5.2.5 Remote Command Execution

PhreeBooks ERP version 5.2.5 suffers from a remote command execution vulnerability.




on

Kentico CMS 12.0.14 Remote Command Execution

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.




on

AV Arcade 3 Insecure Cookie / SQL Injection

AV Arcade version 3 suffers from insecure cookie and SQL injection vulnerabilities.




on

AV Arcade Pro 5.4.3 Cookie Manipulation

AV Arcade Pro version 5.4.3 suffers from an insecure cookie vulnerability that allows for access bypass.




on

ResourceSpace 6.4.5976 XSS / SQL Injection / Insecure Cookie Handling

ResourceSpace suffers from cross site scripting, html injection, insecure cookie handling, and remote SQL injection vulnerabilities. Versions 6.4.5976 and below are affected.




on

Totaljs CMS 12.0 Insecure Admin Session Cookie

Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password.




on

Latest Symantec CEO's 'Revolution' Could Axe 1,000 Jobs















on

Symantec Endpoint Protection Race Condition

Symantec Endpoint Protection versions 14.2.5323.2000, 14.2.5569.2100, and 14.2.5587.2100 suffer from a race condition vulnerability.





on

Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation

Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit.




on

ASX To MP3 Converter 3.1.3.7 Stack Overflow

This Metasploit module exploits a stack buffer overflow in ASX to MP3 converter 3.1.3.7. By constructing a specially crafted ASX file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode. Tested on: Microsoft Windows 7 Enterprise, 6.1.7601 Service Pack 1 Build 7601, x64-based PC Microsoft Windows 10 Pro, 10.0.18362 N/A Build 18362, x64-based PC.




on

Plantronics Hub SpokesUpdateService Privilege Escalation

The Plantronics Hub client application for Windows makes use of an automatic update service SpokesUpdateService.exe which automatically executes a file specified in the MajorUpgrade.config configuration file as SYSTEM. The configuration file is writable by all users by default. This module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64). This Metasploit module has been tested successfully on Plantronics Hub version 3.13.2 on Windows 7 SP1 (x64).




on

Windscribe WindscribeService Named Pipe Privilege Escalation

The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64).







on

Online Job Portal 1.0 Cross Site Request Forgery

Online Job Portal version 1.0 suffers from a cross site request forgery vulnerability.




on

Easy2Pilot 8 SQL Injection / Cross Site Request Forgery

Easy2Pilot version 8 suffers from remote SQL injection, backdoor account, and cross site request forgery vulnerabilities.




on

Prestashop 1.7.6.4 XSS / CSRF / Remote Code Execution

Prestashop versions 1.7.6.4 and below suffer from code execution, cross site request forgery, and cross site scripting vulnerabilities.




on

QRadar Community Edition 7.3.1.6 CSRF / Weak Access Control

QRadar Community Edition version 7.3.1.6 suffers from cross site request forgery and weak access control vulnerabilities.




on

ATutor 2.2.4 Arbitrary File Upload / Command Execution

ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution.




on

Sentrifugo 3.2 File Upload Restriction Bypass

Sentrifugo version 3.2 suffers from a file upload restriction bypass vulnerability.




on

Cisco Data Center Network Manager Unauthenticated Remote Code Execution

DCNM exposes a file upload servlet (FileUploadServlet) at /fm/fileUpload. An authenticated user can abuse this servlet to upload a WAR to the Apache Tomcat webapps directory and achieve remote code execution as root. This module exploits two other vulnerabilities, CVE-2019-1619 for authentication bypass on versions 10.4(2) and below, and CVE-2019-1622 (information disclosure) to obtain the correct directory for the WAR file upload. This module was tested on the DCNM Linux virtual appliance 10.4(2), 11.0(1) and 11.1(1), and should work on a few versions below 10.4(2). Only version 11.0(1) requires authentication to exploit (see References to understand why).




on

IBM Bigfix Platform 9.5.9.62 Arbitary File Upload / Code Execution

IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution.




on

Linear eMerge E3 1.00-06 Arbitrary File Upload Remote Root Code Execution

Linear eMerge E3 versions 1.00-06 and below arbitrary file upload remote root code execution exploit.