header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Welcart e-Commerce 2.0.0 – ‘search[order_column][0]’ SQL injection

The POST parameter 'search[order_column][0]' does not sanitize user input when searching through the order lists. An attacker can use ZAP/Burp to capture the web request when searching through existing order lists and save it to request.txt. Then, they can use sqlmap -r request.txt --dbms=mysql -p search[order_column][0] to exploit the vulnerability.

Millewin 13.39.146.1 – Local Privilege Escalation

The application is prone to insecure permissions in its folders that allows unprivileged user complete control. An attacker can exploit the vulnerability by arbitrarily replacing file(s) invoked by service(s)/startup regkey impacted. File(s) will be executed with SYSTEM privileges.

SmartFoxServer 2X 2.17.0 – God Mode Console WebSocket XSS

Authenticated Cross-Site Scripting (XSS) vulnerability in SmartFoxServer 2X 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the AdminTool console. The vulnerability exists due to insufficient sanitization of user-supplied input passed to the AdminTool console. A remote attacker can send a specially crafted request to the vulnerable application and execute arbitrary HTML code in a user's browser session in context of an affected site.

Sudo 1.9.5p1 – ‘Baron Samedit ‘ Heap-Based Buffer Overflow Privilege Escalation (2)

This exploit is a proof-of-concept for the Sudo 1.9.5p1 vulnerability, which is a heap-based buffer overflow privilege escalation vulnerability. It was discovered by Baron Samedit of Qualys and was exploited by cts with help from r4j and debugged by nu11secur1ty. The exploit was tested on Ubuntu 18.04 and 20.04 & 20.04.01. The exploit code is written in C and is designed to overwrite the target file with the contents of the source file. The exploit requires the user to adjust the RACE_SLEEP_TIME variable to the best value for the system.

Sudo 1.9.5p1 – ‘Baron Samedit ‘ Heap-Based Buffer Overflow Privilege Escalation (1)

Sudo versions from 1.8.2 to 1.8.31p2, stable versions from 1.9.0 to 1.9.5p1 are vulnerable to a heap-based buffer overflow. This vulnerability can be exploited by an attacker to gain root privileges. The exploit code is written in Python3 and requires the attacker to have a valid user account on the target system. The exploit code creates a malicious environment variable and executes the sudo command with the malicious environment variable. This causes a heap-based buffer overflow and allows the attacker to gain root privileges.

Pixelimity 1.0 – ‘password’ Cross-Site Request Forgery

Pixelimity 1.0 has cross-site request forgery via the admin/setting.php data [Password] parameter. The attacker can craft a malicious HTML page with a form that submits a request to the vulnerable application. The form contains hidden fields that are set to the values the attacker wants to submit to the application.

Solaris 10 1/13 (SPARC) – ‘dtprintinfo’ Local Privilege Escalation (2)

This exploit is a pretty lean exploit now, but its development took some time. It involves the %hhn format string, a single-byte write, and a suitable memory location to patch in the .got.plt section of the vulnerable binary.

Recent Exploits: