XiphosResearch

7 exploits Active since Nov 2016
CVE-2017-8917 NOMISEC CRITICAL WORKING POC
Joomla! <3.7.1 - SQL Injection
SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors.
CVSS 9.8
CVE-2015-5947 WRITEUP HIGH WORKING POC
SuiteCRM <7.2.3 - RCE
SuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code.
CVSS 8.1
CVE-2015-5948 WRITEUP HIGH WORKING POC
SuiteCRM <7.2.3 - RCE
Race condition in SuiteCRM before 7.2.3 allows remote attackers to execute arbitrary code. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5947.
CVSS 8.1
CVE-2016-9836 WRITEUP CRITICAL WORKING POC
Joomla! < 3.6.4 - Improper Access Control
The file scanning mechanism of JFilterInput::isFileSafe() in Joomla! CMS before 3.6.5 does not consider alternative PHP file extensions when checking uploaded files for PHP content, which enables a user to upload and execute files with the `.php6`, `.php7`, `.phtml`, and `.phpt` extensions. Additionally, JHelperMedia::canUpload() did not blacklist these file extensions as uploadable file types.
CVSS 9.8
CVE-2016-8870 EXPLOITDB HIGH text WORKING POC
Joomla! <3.6.4 - RCE
The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4, when registration has been disabled, allows remote attackers to create user accounts by leveraging failure to check the Allow User Registration configuration setting.
CVSS 8.1
CVE-2016-8869 EXPLOITDB CRITICAL text WORKING POC
Joomla! <3.6.4 - Privilege Escalation
The register method in the UsersModelRegistration class in controllers/user.php in the Users component in Joomla! before 3.6.4 allows remote attackers to gain privileges by leveraging incorrect use of unfiltered data when registering on a site.
CVSS 9.8
EIP-2026-101832 EXPLOITDB text WORKING POC
LifeSize Room 5.0.9 - Multiple Vulnerabilities