Security
Headlines
HeadlinesLatestCVEs

Tag

#rce

Roxy-WI Remote Command Execution

This Metasploit module exploits an unauthenticated command injection vulnerability in Roxy-WI versions prior to 6.1.1.0. Successful exploitation results in remote code execution under the context of the web server user. Roxy-WI is an interface for managing HAProxy, Nginx and Keepalived servers.

Packet Storm
#vulnerability#web#linux#git#rce#nginx#auth#ssl
Garage Management System 1.0 Shell Upload

Garage Management System version 1.0 suffers from a remote shell upload vulnerability.

Critical security vulnerability in Grails could lead to remote code execution

Maintainers warn to patch all versions of open source web app framework – even those not deemed vulnerable

CVE-2022-35870: ZDI-22-1017

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition 8.1.15 (b2022030114). Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within com.inductiveautomation.metro.impl. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-17265.

CVE-2022-2059: Pandora FMS Common Vulnerabilities and Exposures

In Pandora FMS v7.0NG.761 and below, in the agent creation section, the alias parameter is vulnerable to a Stored Cross Site-Scripting. This vulnerability can be exploited by an attacker with administrator privileges logged in the system.

CVE-2022-24992: CVE-2022–24992: QRCDR ZeroDay Path Traversal Vulnerability

A vulnerability in the component process.php of QR Code Generator v5.2.7 allows attackers to perform directory traversal.

CVE-2022-35649: Official Moodle git projects - moodle.git/search

The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

CVE-2021-23397: Snyk Vulnerability Database | Snyk

All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (merge) function. Maintainer suggests using @generates/merger instead.

CVE-2021-23373: Snyk Vulnerability Database | Snyk

All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality.

CVE-2022-36450: Possible remote code execution through obsidian:// URI scheme

Obsidian 0.14.x and 0.15.x before 0.15.5 allows obsidian://hook-get-address remote code execution because window.open is used without checking the URL.