header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP Image v1.2 Multiple Remote File Inclusion

The vulnerability exists in the xarg_corner.php, xarg_corner_bottom.php, and xarg_corner_top.php files of PHP Image v1.2. These files use the 'include' function to include a file based on the value of the 'xarg' parameter, which can be controlled by an attacker. By manipulating the 'xarg' parameter, an attacker can include arbitrary remote files, leading to remote code execution.

PicaJet FX 2.6.5 – Denial of Service (PoC)

The PicaJet FX version 2.6.5 is vulnerable to a denial of service attack. By providing a specially crafted payload, an attacker can cause the program to crash, resulting in a denial of service. The exploit script creates a file named 'exploit.txt' with a payload of 6000 'A' characters. When this payload is pasted into the 'Registration Name' and 'Registration Key' fields and the 'OK' button is clicked, the program crashes.

Flash Slideshow Maker Professional 5.20 – Buffer Overflow (SEH)

The exploit script creates a new file named 'exploit.txt' which is then copied into the 'Name' and 'Code' fields in the program. This triggers a buffer overflow vulnerability, resulting in a reverse shell being opened in the attacker's machine.

Vulnerability in Task Scheduler Service

The task scheduler service in Windows has a vulnerability in the SchRpcSetSecurity method. This vulnerability allows an attacker to set the DACL (Discretionary Access Control List) of files located in the c:windowstasks folder, even if they do not have the necessary permissions. By creating a hardlink to a file they have read access to, the attacker can overwrite the DACL and gain full control over the file.

Soroush IM Desktop App 0.17.0 – Authentication Bypass

It seems that all databases are encrypted with a constant key and then producing same output across every other PCs so pushing NO_PASSCODE data ,that was encrypted before, to the databases on any other PC, would process the database valid and remove the passcode. The database entries are first entered in a log file in the same folder of the database, and then the Soroush app pushes the log file into permanent database. Attacker can unlock the client app with database injection, and bypass the authentication process. This exploit leads to two important security risks: 1.Attacker can access to all the data, chats, images, files and etc. then he/she is able to send and receive data in behalf of the original user 2.Attacker then may use the exploit to perform an DOS attack. which is done by setting a new passcode for the client without knowing the previous passcode

Recent Exploits: