header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WiFi HD 8.1 – Directory Traversal and Denial of Service

The web server (titled "WiFi" in the app) is vulnerable to multiple directory traversal issues which allow an attacker to download, upload, create, or delete any file to which the app has access. The SMB server (titled "Shared Folder") is vulnerable to a Denial of Service attack when issued the command, "dir -c", within smbclient. It also discloses a listing of all readable files within the iPhone's file system via the IPC$ share.

1 Click Audio Converter Activex Buffer Overflow

A buffer overflow vulnerability exists in 1 Click Audio Converter Activex due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by enticing a victim to open a malicious web page containing a specially crafted HTML object tag. This can result in arbitrary code execution in the context of the current user.

WordPress Really Simple Guest Post File Include

The vulnerable file is called simple-guest-post-submit.php and its full path is /wp-content/plugins/really-simple-guest-post/simple-guest-post-submit.php. The vulnerable code is as follows: (line 8) require_once($_POST["rootpath"]); As you can see, the require_once function includes a data based on user-input without any prior verification. So, an attacker can exploit this flaw and come directly into the url /wp-content/plugins/really-simple-guest-post/simple-guest-post-submit.php and send a post data like: "rootpath=the_file_to_include". Proof of concept: curl -X POST -F "rootpath=/etc/passwd" --url http://localhost/wp-content/plugins/really-simple-guest-post/simple-guest-post-submit.php which will print out the content of /etc/passwd file.

WebDrive 12.2 (B4172) – Buffer Overflow Vulnerability

An independent vulnerability laboratory researcher discovered an unicode buffer overflow vulnerability in the official WebDrive v12.2 (Build 4172) 32 bit software. The buffer overflow vulnerability allows to include unicode strings to basic code inputs from a system user account to compromise the software. The vulnerability is located in the `username` and `password` input fields of the software.

Jildi FTP Client Buffer Overflow Poc

JilidFTP is a powerful ftp-client program for Windows, it fast and reliable and with lots of useful features. It supports multi-thread file upload or download, so you can upload or download several files at the same time. The job manager integrates with the Windows scheduler engine, this provide you more freedom and flexibility to upload or download your files. It can also traces changes within a local directory and apply these changes to remote ftp server. The user-friendly interface lets your software distribution, uploading files to a web-server, and providing archives for various purposes more easily. To exploit this vulnerability, an attacker can copy the AAAA...string from Jildi_FTP.txt to clipboard, open Jildi Ftp and press Connect and paste it in the Option -- Name or Address --and press connect.

CSRF & Persistent XSS

No CSRF token in place, therefore we can add arbitrary users to the system. variabili.php has multiple XSS vectors using POST method, one input field 'altezza_iframe_tabella_gid' will store XSS payload into the MySQL database which will be run each time variabili.php is accessed from victims browser.

Recent Exploits: