header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

mcart.xls Bitrix module SQL Injection Vulnerability

Multiple SQL Injection vulnerabilities in mcart.xls Bitrix module can be exploited to execute arbitrary SQL queries, obtain sensitive data, modify information in the database, and gain complete control over the vulnerable website. The vulnerabilities require the attacker to be authorized against the website and have access to the vulnerable module. However, the vulnerabilities can also be exploited via CSRF vector if the web application does not check the origin of received requests. This allows a remote anonymous attacker to create a page with a CSRF exploit, trick the victim into visiting this page, and execute arbitrary SQL queries in the database of the vulnerable website.

Integer Overflow Vulnerability in Grassroots DICOM (GDCM) Library

GDCM versions 2.6.0 and 2.6.1 are prone to an integer overflow vulnerability which leads to a buffer overflow and potentially to remote code execution. The vulnerability is triggered by the exposed function gdcm::ImageRegionReader::ReadIntoBuffer, which copies DICOM image data to a buffer. ReadIntoBuffer fails to detect the occurrence of an integer overflow, which leads to a buffer overflow later on in the code.

Webdesproxy Remote Root Exploit

This exploit takes advantage of an uninitialized pb structure variable on .bss to execute arbitrary commands with root privileges. It uses the reverse connect-back method and targets systems running Fedora Core 6 with exec-shield enabled. The exploit modifies the arguments passed to execle() to execute a command of the attacker's choice. It also searches for 8 bytes of null from the stack to define an environment variable. The exploit requires 13 ret (pop %eip) codes to reach the desired stack position. It has been tested on Fedora Core 6 with webdesproxy version 0.0.1.

Recent Exploits: