header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Rukovoditel Project Management CRM 2.5.2 – ‘reports_id’ SQL Injection

Rukovoditel Project Management CRM version 2.5.2 is vulnerable to SQL Injection. This vulnerability can be exploited by sending a maliciously crafted POST request to the application. An attacker can inject malicious SQL queries in the 'reports_id' parameter of the application. This can be exploited to gain access to sensitive information from the database.

WordPress Plugin Postie 1.9.40 – Persistent Cross-Site Scripting

Postie is a WordPress plugin that allows users to post to their blog via email. Postie versions 1.9.40 and below are vulnerable to persistent cross-site scripting (XSS) due to improper input validation. An attacker can craft a malicious email with a polyglot JavaScript syntax and a crafted SVG to perform a persistent XSS attack. This can allow an attacker to execute arbitrary JavaScript code in the context of the vulnerable website.

Modifying the contents of a read-only ashmem fd

This bug report describes two ways in which an attacker can modify the contents of a read-only ashmem fd. Android's ashmem kernel driver has an ->mmap() handler that attempts to lock down created VMAs based on a configured protection mask such that in particular write access to the underlying shmem file can never be gained. However, the code does not check the VM_MAY* flags that were already set in the vma->vm_flags before the call to ashmem_mmap().

WeChat Memory Corruption Vulnerability

When an RTP packet is processed, there is a call to UnpacketRTP. This function decrements the length of the packet by 12 without checking that the packet has at least 12 bytes in it. This leads to a negative packet length. Then, CAudioJBM::InputAudioFrameToJBM will check that the packet size is smaller than the size of a buffer before calling memcpy, but this check (n < 300) does not consider that the packet length could be negative due to the previous error. This leads to an out-of-bounds copy.

Redir 3.3 – Denial of Service (PoC)

The source code of redir.c contains doproxyconnect() function which has the stack overflow vulnerability. Download and build the source code, then run the program with a long string of characters as an argument. This will cause the program to crash due to the buffer overflow vulnerability.

VPN unlimited 6.1 – Unquoted Service Path

The VPN Unlimited Service is vulnerable to Unquoted Service Path vulnerability. This vulnerability allows an attacker to gain elevated privileges on the system by exploiting the service path. The service path is not quoted, which allows an attacker to inject malicious code into the service path.

Microsoft Windows 10 – Local Privilege Escalation (UAC Bypass)

I discovered a Local Privilege Escalation in Windows 10 (UAC Bypass), via an auto-elevated process. The executable is changepk.exe. changepk is used to pass a new product key, you can pass the key also via commandline. By executing changepk.exe and tracing the process we can see some RegOpenKey operations that lead to open some non-found Key in the registry (HKCU). In our case we can use "HKCU:SoftwareClassesLauncher.SystemSettingsShellOpenCommand" to spawn our Administrator cmd or to bypass the mmc UAC.

Recent Exploits: