header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apache Tomcat (packaging on RedHat-based distros) – Root Privilege Escalation

The vulnerability stems from the tomcat.conf file installed by default by packages on RedHat-based systems with write permissions for the tomcat group. An attacker who is able to write files with tomcat user permissions (for example, through a vulnerability in web application hosted on Tomcat) can create a malicious shared library in the /run/tomcat directory and then create a symbolic link in the /etc/ld.so.preload file which will cause the malicious library to be loaded and executed with root privileges every time a setuid binary is executed on the system.

PHP Press Release* – Stored Cross Site Scripting*

A stored XSS vulnerability exists in the PHP Press Release application. An attacker can inject malicious JavaScript code into the 'title' parameter of the 'administration.php?pageaction=saverelease' page. When a user visits the page, the malicious code will be executed in the user's browser.

PHP Press Release – Cross-Site Request Forgery (Add Admin – Super User )

A Cross-Site Request Forgery (CSRF) vulnerability exists in PHP Press Release, which allows an attacker to add an admin user with Super user access level. An attacker can craft a malicious HTML page and send it to the victim. When the victim visits the malicious page, the attacker's request will be executed in the background and an admin user with Super user access level will be added.

ShoreTel Connect ONSITE Blind SQL Injection Vulnerability

Versions of ShoreTel Connect ONSITE prior and including 21.79.4311.0 are vulnerable to a Blind SQL Injection in /authenticate.php, on the webserver that is running the Conference system. Specifically, the POST parameter "username" is not sanitised prior to being used in SQL Queries. Using test'%20and%20(select*from(select(sleep(35)))a)--%20 for the username value the server will respond after approximately 35 seconds. No authentication is needed in order to exploit the vulnerability as the issue resides in the pre-authentication realm of the system.

Unquoted Service Path Privilege Escalation

Wacom's "Wacom Consumer Service" installs as a service with an unquoted service path running with SYSTEM privileges. This could potentially allow an authorized but non-privileged localuser to execute arbitrary code with elevated privileges on the system. A successful attempt would require the local attacker must insert an executable file in the path of the service. Upon service restart or system reboot, the malicious code will be run with elevated privileges.

Entrepreneur Job Portal Script SQL Injection

SQL Injection vulnerability exists in Entrepreneur Job Portal Script version 2.06. An attacker can exploit this vulnerability to inject malicious SQL queries in the application and gain access to sensitive data from the database. This vulnerability can be exploited by sending a maliciously crafted HTTP request to the vulnerable application.

BlueStacks 2.5.55 Unquoted Service Path Privilege Escalation

BlueStacks Log Rotator Service (BstHdLogRotatorSvc) installs as a service with an unquoted service path running with SYSTEM privileges. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system.

Simple PHP Blog 0.8.4 – Cross-Site Request Forgery (Add Admin)

Simple PHP Blog 0.8.4 versions is vulnerable to CSRF attack (No CSRF token in place) meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), a form will be submitted to (http://localhost/simple/manage_users.php?action=update&type=new) that will add a new user as administrator. Once exploited, the attacker can login to the admin panel (http://localhost/simple/login.php) using the username and the password he posted in the form.

Exagate WEBpack Management System Multiple Vulnerabilities

There is no any filtering or validation mechanisim on "login.php". "username" and "password" inputs are vulnerable to SQL Injection attacks. The software is capable of sending e-mail to system admins. But there is no any authorization mechanism to access e-mail logs. The e-mail logs can accesed by anyone.

Recent Exploits: