header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AVS Audio Converter 10.3 – Stack Overflow (SEH)

AVS Audio Converter 10.3 is vulnerable to a stack overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by crafting a malicious file and sending it to the victim, which can then be used to execute arbitrary code on the victim's system. The vulnerable module is AVSAudioConverter.exe, which has SafeSEH disabled. The exploit involves allocating 4-bytes for nSEH which should be placed directly before SEH which also takes up 4-bytes. The exploit can be generated using python 2.7.x on Linux.

WebTareas 2.4 – RCE (Authorized)

A remote code execution vulnerability exists in WebTareas 2.4 due to improper input validation. An attacker can send a maliciously crafted HTTP POST request to the chattab_serv.php script with a specially crafted filename parameter containing PHP code. This code will be executed on the server when the script is executed.

WebTareas 2.4 – Reflected XSS (Unauthorised)

A reflected XSS vulnerability exists in WebTareas 2.4, which allows an unauthorised user to inject malicious JavaScript code into the application. The vulnerability is triggered when a maliciously crafted URL is sent to the application, which is then reflected back to the user. The malicious code is executed in the user's browser, allowing the attacker to gain access to sensitive information or perform other malicious actions.

WebTareas 2.4 – SQL Injection (Unauthorised)

WebTareas 2.4 is vulnerable to an unauthorised SQL injection attack. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious webTareasSID cookie. This cookie contains a malicious payload which can be used to execute arbitrary SQL commands on the underlying database.

Atom CMS v2.0 – SQL Injection (no auth)

Atom CMS v2.0 is vulnerable to SQL Injection without authentication. An attacker can send a maliciously crafted HTTP POST request to the vulnerable application with a specially crafted 'id' parameter. This can allow an attacker to execute arbitrary SQL queries on the underlying database.

Aero CMS v0.0.1 – SQL Injection (no auth)

Aero CMS v0.0.1 is vulnerable to SQL Injection without authentication. An attacker can send a specially crafted HTTP POST request to the search.php page with malicious SQL code in the search parameter. This will cause the server to return an error message containing the SQL code, which can be used to extract information from the database.

WiFi Mouse 1.8.3.2 – Remote Code Execution (RCE)

Desktop Server software used by mobile app has PIN option which does not to prevent command input. Connection response will be 'needpassword' which is only interpreted by mobile app and prompts for PIN input. A python script is used to exploit the vulnerability by sending a payload to the target IP address and executing it.

Zoneminder v1.36.26 – Log Injection -> CSRF Bypass -> Stored Cross-Site Scripting (XSS)

The PoC injects a XSS payload with the CSRF bypass into logs. This action will repeat every second until manually stopped. Admin user logs navigates to http://<target>/zm/index.php?view=log and XSS executes delete function on target UID (user).

Recent Exploits: