header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PayPal Shop Digital <<= SQL injection Vulnerability

The vulnerability exists in the view_item.php script, which is vulnerable to SQL injection attacks. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable script with the ItemID parameter containing malicious SQL code. This can allow the attacker to access or modify the application's data, execute system commands, or even access the underlying file system.

MHP DownloadScript v2.2 <<= SQL injection Vulnerability

MHP DownloadScript v2.2 is vulnerable to SQL injection. An attacker can inject malicious SQL queries to the vulnerable parameter in the admin login page. This can be exploited to bypass authentication, access, modify or delete data from the database.

Ecava IntegraXor Remote ActiveX Buffer Overflow PoC

There is a stack-based buffer overflow in IntegraXor that can be triggered by passing an overly large value to the "save" method of the IntegraXor.Project control located in igcomm.dll. This control is marked both safe for scripting and safe for initialization. The vulnerable code in this block passes String1 (dest) and lpString2 (src) to lstrcpyW() without validating the length of lpString2. lstrcpyW() then copies lpString2 byte for byte into String1 (1024 bytes wchar buffer) and adds a terminating NULL byte to the end. If you attach a debugger and set a breakpoint on 100027CD, you can see an exception registration record is stored before the return address.

Radius Manager Multiple Cross Site Scripting Issues

Radius Manager is a centralized way for administration of Mikrotik, Cisco, Chillispot and StarOS routers and wireless access points. It has a centralized accounting system that uses Radius, provinding easy user and accounting management for ISP's. This problem was confirmed in the following versions of the Radius Manager, other versions maybe also affected. Radius Manager 3.8.0. The Radius Manager system is affected by Multiple Stored Cross Site Scripting. The “Group Name” and “Description” in “new_usergroup” menu do not sanitize input data, allowing attacker to store malicious javascript code in a page. The same thing occurs with “new_nas” menu.

File Upload Vulnerability [ Plugins tiny_mce ]

A file upload vulnerability exists in the TinyMCE plugin, which allows an attacker to upload malicious files to the server. The vulnerability is due to the lack of proper input validation and sanitization of the uploaded files. An attacker can exploit this vulnerability by uploading a malicious file with a .gif extension, which can then be moved to a .php extension.

CubeCart v 3.x Remote File Upload Vulnerability

A vulnerability exists in CubeCart v3.x which allows an attacker to upload a malicious file to the server. The vulnerability exists in the 'includes/rte/editor/filemanager/browser/default/connectors/test.html' page, which allows an attacker to upload a malicious file using the PHP mode.

Hauri ViRobot Desktop 5.5 & ViRobot Server 3.5 VRsecos.sys <=2008.8.1.1 Local Kernel Mode Privilege Escalation Vulnerability

VRsecos.sys create a device called 'VRsecos' and handles DeviceIoControl Code = 0x8307202c, which use the function 'strcpy' to copy memory from irp systembuffer to driver's data area, can be overwrite critical kernel object memory in vrsecos.sys's data area.

NProtect Anti-Virus 2007 with TKRgAc2k.sys <= 2010.5.11.1 Local Kernel Mode Privilege Escalation Vulnerability

TKRgAc2k.sys create a device called 'TKRgAc', and handles these io control codes for: 0x22140:Receive registry monitor key value name MD5, 0x221448:Receive Registry monitor key name, 0x221444:Receive Registry key monitor enable, 0x221410:Receive virus name that matchs the key value name MD5, 0x220c54:Create share memory for receive virus notification, 0x220c5c:Receive event handle for send virus notification. Tkacrg2k.sys create FileObject->FsContext for each process to open the device, and save key/key value/virus name/event object in FsContext. Here contains a design error, if a registry operation is intercepted and match the rules, but event handle has not been set, TKAcRg2k.sys will still be nofity of this event to ring3 with KeSetEvent(NULL,0). An attacker can allocate a fake KEVENT structure at zero address and overwrite any address with KEvent->WaitThreadList->KThread->WaitListEntry's remove list entry operation.

AhnLab V3 Internet Security 8.0 with AhnRec2k.sys <= 1.2.0.4 Local Kernel Mode Privilege Escalation Vulnerability

AhnRec2k.sys create a device called 'AhnRecDrv' and handles DeviceIoControl Code = 0x8101261C, which execute user input function pointer in kernel mode. Although AhnRec2k.sys did not create any symbolic link for this device and leave this device's interface for internal use, we can still use native function 'ZwCreateFile' to open the device and send request to its. AhnRec2k.sys (1.2.0.4) will check if function pointer below MmHighestUserAddress, but it also can be exploit.

Recent Exploits: