header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Softbiz Ad Management plus Script ver 1 SQL INJECTION

The Softbiz Ad Management plus Script version 1 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting SQL code through the 'package' parameter in the 'ads.php' file. By using a specific SQL code, the attacker can retrieve sensitive information such as the admin username and password.

GL-AR300M-Lite Authenticated Command injection – Arbitrary file download – Directory Traversal

The GL-AR300M-Lite router is vulnerable to multiple vulnerabilities, including command injection (CVE-2019-6272), arbitrary file download (CVE-2019-6273), and directory traversal (CVE-2019-6274). These vulnerabilities allow an authenticated attacker to execute arbitrary commands, download arbitrary files, and traverse directories on the affected router.

ntpsec 1.1.2 authenticated NULL pointer exception Proof of concept

This exploit allows an attacker to trigger a NULL pointer exception in ntpsec version 1.1.2, causing a denial-of-service condition. The vulnerability is authenticated, meaning that the attacker must provide valid credentials to exploit it. The exploit sends a specially crafted packet to the target server, triggering the NULL pointer exception.

Softbiz Auctions Script Sql Injection

The Softbiz Auctions Script is vulnerable to SQL Injection. An attacker can inject malicious SQL code in the 'id' parameter of the product_desc.php file, allowing them to extract sensitive information from the database. The specific SQL code provided in the exploit description can be used to retrieve the admin_name and pwd (password) fields from the sbauctions_admin table.

Windows: Browser Broker Cross Session EoP

The Browser Broker COM object doesn’t verify its caller correctly allowing one user to execute arbitrary code in another logged on user’s session. The majority of the calls are checked with functions such as BrokerAuthenticateAttachedCallerGetPIC which ensures the caller is an Edge process (based on its package ID) and meets certain requirements based on the sandbox type etc. One thing this code doesn’t do is check that the caller is the same user as the running broker process.

Windows: DSSVC CanonicalAndValidateFilePath Security Feature Bypass

The Data Sharing Service’s check for the user passing UNC paths can be circumvented leading to a security feature bypass which can facilitate easier exploitation for privilege elevation. During DSSCreateSharedFileTokenEx, the path is passed to DSUtils::CanonicalAndValidateFilePath to canonicalize the path. This method also verifies that the passed path isn’t a UNC path (for reasons unknown). The UNC path check can be bypassed by using the ??UNC form. When this is passed to PathAllocCanonicalize, it returns it verbatim, however, this path format isn’t considered a UNC path by PathIsUNCEx. However, when passed to CreateFile, etc., it will be considered as if it was a ?UNC path format. This could be useful for a few different attacks. For a start, you could redirect the call to localhostpipesomepipe and get a named pipe handle bound to the SYSTEM user. Although I’ve not worked out a way of getting the handle back (as GetFinalPathFromHandle fails). Another attack vector is when going to an SMB share any directory junctions are resolved on the server, this would allow you to bypass any checks such as DSUtils::VerifyPathFromHandle as the returned path would be ?UNClocalhostc$blah.. Regardless of the final des

Dokany Stack-based Buffer Overflow Privilege Escalation

This exploit allows for privilege escalation in Dokany, a file system library for Windows. By exploiting a stack-based buffer overflow vulnerability, an attacker can gain elevated privileges on the system. The vulnerability exists in the driver version 1.2.0.1000 of Dokany. The exploit code leverages offsets and memory manipulation to steal the token and gain elevated privileges.

Recent Exploits: