header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Support Incident Tracker <= 3.65 Remote Command Execution

This module combines two separate issues within Support Incident Tracker (<= 3.65) application to upload arbitrary data and thus execute a shell. The two issues exist in ftp_upload_file.php. The first vulnerability exposes the upload dir used to store attachments. The second vulnerability allows arbitrary file upload since there is no validation function to prevent from uploading any file type. Authentication is required to exploit both vulnerabilities.

Soda PDF Professional 1.2.155 PDF/WWF File Handling Restriction of Service (RoS)

Soda PDF Pro suffers from a restriction of service (RoS) vulnerability when handling PDF or WWF file formats which can be exploited by malicious people to cause a denial of service scenario.

I Can’t Read and I Won’t Race You Either

A while back, Tavis showed us three ways to exploit flaws in glibc's dynamic linker involving LD_AUDIT. The first way involved opening a file descriptor and using fexecve to easily win a race with $ORIGIN. The problem was that this required having read permissions on the SUID executables. Tavis recommended a work around involving filling a pipe until it was full so that anything written to stderr would block. This race, however, was not always successful. The third thing he showed us was that LD_AUDIT would load any trusted library, and he pointed out that libpcprofile.so could be jiggered to create a world writable root owned file in any directory. One candidate would be to write something to a crontab. What if, however, you don't have cron installed? He then went on to explain a quite extensive search routine to find candidates for libraries to load. But why search, when you already can make a world writable root owned file in any directory you want? The easier way is to use libpcprofile.so to create such a file, and then fill that file with code you want to run. Then, run that code using the same trick.

Comtrend Router CT-5624 Remote Root/Support Password Disclosure/Change Exploit

This exploit allows an attacker to remotely disclose or change the root/support password of Comtrend Router CT-5624. The exploit is written in Perl and uses the LWP::Simple module to send a GET request to the router's password.cgi page. The exploit has been tested on two different versions of the router, CT-5624 and CT-5637.

osCSS2 “_ID” parameter Local file inclusion

osCSS2 2.1.0 "_ID" parameter is prone to a LFI vulnerability. The vulnerable code is present in the .htaccess, content.php and page.php files. The PoC-Exploit involves sending a malicious request to the target server with the _ID parameter set to a malicious file path. This can be used to read sensitive files from the server.

OrderSys <= 1.6.4 Sql Injection Vulnerabilities

All versions of OrderSys <= 1.6.4 are affected by Sql injection vulnerabilities. A valid account could be required to exploit the vulnerabilities. Proof of Concept: http://localhost/ordersys/ordering/interface_creator/index.php?table_name=vendor&function=search&where_clause=[SQL INJECTION]&page=0&order=Address&order_type=ASC http://localhost/ordersys/ordering/interface_creator/index_long.php?table_name=vendor&function=search&where_clause=[SQL INJECTION]&page=0&order=Address&order_type=ASC http://localhost/ordersys/ordering/interface_creator/index_short.php?table_name=vendor&function=search&where_clause=[SQL INJECTION]&page=0&order=Address&order_type=ASC

Recent Exploits: