skysbsb

5 exploits Active since Mar 2009
CVE-2024-21626 NOMISEC HIGH WORKING POC
runc (docker) File Descriptor Leak Privilege Escalation
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
CVSS 8.6
CVE-2012-1124 EXPLOITDB CRITICAL text WORKING POC
phxEventManager 2.0 beta 5 - SQL Injection
SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.
CVSS 9.8
CVE-2009-0932 EXPLOITDB text WORKING POC
Debian Horde - Path Traversal
Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
CVE-2020-35775 EXPLOITDB CRITICAL text WRITEUP
Citsmart < 9.1.2.23 - Injection
CITSmart before 9.1.2.23 allows LDAP Injection.
CVSS 9.8
CVE-2021-28142 EXPLOITDB HIGH text WRITEUP
CITSmart <9.1.2.28 - Info Disclosure
CITSmart before 9.1.2.28 mishandles the "filtro de autocomplete."
CVSS 8.8