header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PonyOS <= 3.0 tty ioctl() local kernel exploit

PonyOS 0.4.99-mlp had two kernel vulnerabilities disclosed in April 2013 that could be leveraged to read/write arbitrary kernel memory. This is due to tty winsize ioctl() allowing to read/write arbitrary memory. This exploit patches the setuid system call to remove a root uid check allowing any process to obtain root privileges.

WordPress LeagueManager SQLi

The WordPress LeagueManager plugin is vulnerable to an unauthenticated SQL injection vulnerability. The vulnerable code is located in the lib/core.php file, where the getMatch() and getLeague() functions are passed an unsanitized $match_id and $league_id parameter to the SQL query. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can be done using a tool such as SQLMap, which can be used to send a payload to the vulnerable server and extract data from the database.

ClearPass Policy Manager Stored XSS

The analysis discovered a stored cross site scripting vulnerability (OWASP OTG-INPVAL-002) in the ClearPass Policy Manager. A malicious unauthenticated user is able to inject arbitrary script through the login form that may be rendered and triggered later if a privileged authenticated user reviews the access audit record. An attack can use the aforementioned vulnerability to effectively steal session cookies of privileged logged on users.

D-Link Devices HNAP SOAPAction-Header Command Execution

Different D-Link Routers are vulnerable to OS command injection in the HNAP SOAP interface. Since it is a blind OS command injection vulnerability, there is no output for the executed command. This module has been tested on a DIR-645 device. The following devices are also reported as affected: DAP-1522 revB, DAP-1650 revB, DIR-880L, DIR-865L, DIR-860L revA, DIR-860L revB DIR-815 revB, DIR-300 revB, DIR-600 revB, DIR-645, TEW-751DR, TEW-733GR

PonyOS <= 3.0 ELF loader privilege escalation

PonyOS is vulnerable to a privilege escalation vulnerability in the ELF loader. The vulnerability is caused by a lack of validation of the ELF header, which allows an attacker to craft a malicious ELF file that can be used to gain root privileges. The vulnerability can be exploited by an attacker who has access to the system, either locally or remotely. The attacker can then upload the malicious ELF file to the system and execute it, which will result in the attacker gaining root privileges.

WordPress dzs-zoomsounds Plugins Remote File Upload Vulnerability

A vulnerability in the WordPress dzs-zoomsounds plugin allows an attacker to upload a malicious file to the server. The vulnerable file is upload.php, which is located in the admin folder of the plugin. An attacker can use a malicious file such as dz.phtml and upload it to the server using the upload.php file. The malicious file can then be accessed via the URL http://127.0.0.1/wp-content/plugins/dzs-zoomsounds/admin/upload/$Evil

IBM Security AppScan Standard OLE Automation Array Remote Code Execution

This exploit is based on MS14-064 CVE-2014-6332 and allows attackers to execute arbitrary code on the vulnerable system. It uses a Python script to start a sample HTTP server on the attacker machine and serves an exploit code and Metasploit windows/shell_bind_tcp executable payload.

JSPMyAdmin 1.1 SQL Injection, CSRF & XSS

JSPMyAdmin 1.1 is a Java web based MySQL database management system. It is vulnerable to SQL Injection, CSRF and XSS attacks. The deletedata.jsp page is vulnerable to SQL Injection as it uses concatenated user input to build SQL statements even though paramaterized queries are used. There is no CSRF token used, allowing attackers to drop any database by sending malicious links. There is also zero user input checks allowing remote attackers to execute arbitrary scripts in the context of an authenticated user's browser session.

Recent Exploits: