header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Install.framework runner SUID Root Binary Privilege Escalation

The Install.framework runner suid root binary does not correctly account for the fact that Distributed Objects can be connected to by multiple clients at the same time. By connecting two proxy objects to an IFInstallRunner and calling [IFInstallRunner makeReceiptDirAt:asRoot:] in the first and passing a custom object as the directory name we can get a callback to our code just after the makeReceiptDirAt code has called seteuid(0);setguid(0) to regain privs. Since BSD privileges are per-process this means that our other proxy object will now have euid 0 without having to provide an authorization reference. In this second proxy we can then just call runTaskSecurely and get a root shell before returning from the first proxy's callback function which will then drop privs.

TimThumb WordPress Plugin Multiple Vulnerabilities

The TimThumb plugin for WordPress is prone to multiple security vulnerabilities including XSS, security bypass, arbitrary file upload, information disclosure, path disclosure, and denial-of-service. Attackers can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, perform administrative actions, gain unauthorized access, upload arbitrary files, compromise the application, modify data, cause denial-of-service conditions, steal authentication credentials, or control how the site is rendered to the user.

PostNuke pnFlashGames Module v1.5 Remote SQL Injection

The vulnerability allows an attacker to inject SQL commands into the application's database. By manipulating the 'cid' parameter in the 'index.php?module=pnFlashGames&func=view' URL, an attacker can perform a union-based SQL injection and extract sensitive information from the database.

Photoshop CS2/CS3, Paint Shop Pro 11.20 .PNG File Buffer Overflow

The exploit allows for a buffer overflow in Photoshop CS2/CS3 and Paint Shop Pro 11.20 when parsing PNG files. It can execute arbitrary code such as running calc.exe or binding to port 4444. It has been tested on Windows XP SP2 FR.

Cisco Sourcefire User Agent Insecure File Permissions Vulnerability

Sourcefire User Agent is vulnerable to default insecure file permissions and hardcoded encryption keys. A local attacker can exploit this by gaining access to user readable database file and extracting sensitive information. In combination with hard-coded 3DES keys an attacker is able to decrypt configured Domain Controller accounts which can lead to further attacks.

IPIX Image Well ActiveX Buffer Overflow Exploit

This exploit targets the iPIX Image Well ActiveX control, specifically the CreateMediaGroup method. The vulnerability allows an attacker to execute arbitrary code by providing specially crafted parameters to the method. The exploit code includes a shellcode that executes the calc.exe program.

Endian Firewall Proxy Password Change Command Injection

This module exploits an OS command injection vulnerability in a web-accessible CGI script used to change passwords for locally-defined proxy user accounts. Valid credentials for such an account are required. Command execution will be in the context of the "nobody" account, but this account had broad sudo permissions, including to run the script /usr/local/bin/chrootpasswd (which changes the password for the Linux root account on the system to the value specified by console input once it is executed). The password for the proxy user account specified will *not* be changed by the use of this module, as long as the target system is vulnerable to the exploit. Very early versions of Endian Firewall (e.g. 1.1 RC5) require HTTP basic auth credentials as well to exploit this vulnerability. Use the USERNAME and PASSWORD advanced options to specify these values if required. Versions >= 3.0.0 still contain the vulnerable code, but it appears to never be executed due to a bug in the vulnerable CGI script which also prevents normal use (http://jira.endian.com/browse/UTM-1002). Versions 2.3.x and 2.4.0 are not vulnerable because of a similar bug (http://bugs.endian.com/print_bug_page.php?bug_id=3083). Tested successfully against the following versions of EFW Community: 1.1 RC5, 2.0, 2.1, 2.2, 2.5.1, 2.5.2. Should function against any version from 1.1 RC5 to

Recent Exploits: