header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Zen Cart PHP File Inclusion Vulnerability

High-Tech Bridge Security Research Lab discovered critical vulnerability in a popular e-commerce software Zen Cart, which can be exploited by remote non-authenticated attackers to compromise vulnerable system. A remote unauthenticated attacker might be able to execute arbitrary PHP code on the target system, run arbitrary system commands, gain complete access to application's database and obtain information of all website users. The vulnerability exists due to absence of filtration of directory traversal sequences in 'act' HTTP GET parameter in '/ajax.php' script, when including local PHP files using 'require()' PHP function. A remote unauthenticated attacker can include and execute arbitrary PHP code on the target system with privileges of the web server.

Virtfshell

Virtfshell is an exploit that takes advantage of the Time-of-Check-Time-of-Use (TOCTOU) vulnerability in the virtfs-proxy-helper from QEMU. The exploit makes use of the inotify_init() and inotify_add_watch() functions to monitor the /tmp/virtfshell directory for changes. When the virtfs-proxy-helper is executed, it creates a socket in the /tmp/virtfshell directory. The exploit then replaces the socket with a symlink to /etc/shadow, which is then chown'd to the user's UID and GID, thus elevating the user to root. The exploit then runs a cleanup script to remove any traces of the exploit.

Easy File Sharing Web Server 7.2 – HEAD HTTP request SEH Buffer Overflow

A buffer overflow vulnerability exists in Easy File Sharing Web Server 7.2 when handling a specially crafted HEAD HTTP request. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is due to a lack of proper validation of user-supplied input when handling the request. An attacker can send a specially crafted request containing an overly long string to trigger this vulnerability.

Easy File Sharing Web Server 7.2 – GET HTTP request SEH Buffer Overflow

A buffer overflow vulnerability exists in Easy File Sharing Web Server 7.2 when handling a specially crafted GET HTTP request. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is due to a lack of proper bounds checking of user-supplied data before copying it into a fixed-length buffer. An attacker can exploit this vulnerability by sending a specially crafted GET HTTP request containing an overly long string to the vulnerable application. This can result in a buffer overflow, which can be exploited to execute arbitrary code in the context of the application.

FireEye MPS Remote Code Execution Vulnerability

FireEye MPS is vulnerable to a remote code execution vulnerability, simply from monitoring hostile traffic. This vulnerability allows an attacker to compromise the FireEye device, get a root shell and start monitoring all traffic on the victim network (emails, attachments, downloads, web browsing, etc). This is due to a bug in one of the analysis tools used by the MIP (Malware Input Processor), which has various tools for analysis of different file types. One of these tools is a script that attempts to decompile Java Archives, then runs some simple regexes over the decompiled code. Examining the source code for JODE, it supports a 'String Deobfuscation' feature that relies on reflection, this is visible here. This code allows an attacker to execute arbitrary code on the FireEye device, simply by sending a malicious Java Archive file.

Article Script SQL Injection Vulnerability

Article Script is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Recent Exploits: