header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pro Chat Rooms v8.2.0 – Multiple Vulnerabilities

Text Chat Room Software of ProoChatRooms is vulnerable to Stored XSS, Reflected XSS and SQL injections. After registered an account, an attacker can upload a profile picture containing Javascript code. The picture is uploaded under the directory '/profiles/uploads' and is accessible by force browsing to the 32 digits value. The parameter 'edit' is not encoded and can be used to inject malicious code. Across the all source code of web application, parameterized queries are used to query the database. However, a lack of data sanitization of three parameters leaves the web application vulnerable to SQLi.

HybridAuth <= 2.2.2 Remote Code Execution

HybridAuth enable developers to easily build social applications to engage websites vistors and customers on a social level by implementing social signin, social sharing, users profiles, friends list, activities stream, status updates and more. I just found that the latest development version (2.2.2-dev) in Github was trying to patch this months ago. However, the sanitization is not sufficient to prevent PHP code injection. We can inject to next value that will never be sanitized with htmlentities() :/ Note that the default installation leave 'install.php' untouched.

Symantec Endpoint Protection 11.x, 12.x – Kernel Pool Overflow

This exploit is a kernel pool overflow vulnerability in Symantec Endpoint Protection 11.x and 12.x. It allows an attacker to gain arbitrary code execution in the context of the SYSTEM user. The vulnerability is triggered by sending a specially crafted IOCTL request to the vulnerable driver. The exploit uses a technique called “kernel pool spraying” to increase the chances of success.

FreeDisk v1.01 iOS – Multiple Web Vulnerabilities

Multiple web vulnerabilities have been discovered in the official FreeDisk v1.01 iOS mobile web-application. The vulnerabilities include local file include, local file path traversal, local file upload, local file delete, local file manipulation, and local file access. These vulnerabilities allow remote attackers to include, traverse, upload, delete, manipulate, and access local files from the mobile device to compromise the mobile web-application.

Video WiFi Transfer 1.01 – Directory Traversal Vulnerability

A directory traversal web vulnerability has been discovered i the official Bluefinger App Video WiFi Transfer/MP4 Conversion v1.01 iOS mobile application. The vulnerability allows remote attackers to traverse directories and read sensitive files from the mobile web-application. The vulnerability is located in the `file` value of the `/download` POST method request. Remote attackers are able to inject malicious path traversal strings to read sensitive files from the mobile web-application.

TP-Link TL-WR740N v4 router (FW-Ver. 3.16.6 Build 130529 Rel.47286n) arbitrary shell command execution

The domain name parameters of the 'Parental Control' and 'Access Control' features of the TP-Link TL-WR740N v4 (FW-Ver. 3.16.6 Build 130529 Rel.47286n) router are prone to arbitrary shell command execution as root for users who are authenticated against the web interface. Each shell payload is restricted up to 28 bytes. The 'Parental Control' feature allows you to specify 8 domains (= 8 commands) so you have 8 x 28 = 244 bytes of shell commands. This is sufficient to post-load and execute a shell script of arbitrary length from a tftp server. Employing this method one can gain full control over the device when post-loading a mightier busybox MIPS binary and executing telnetd or using netcat to connect back. Default login credentials are known to be root:5up, Admin:5up or ap71:.

Improper Access Control in ArticleFR

The vulnerability exists due to insufficient access restrictions when accessing the "/data.php" script. A remote attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary UPDATE SQL commands in application’s database. Successful exploitation of the vulnerability allows modification of arbitrary database record. A remote attacker can modify or delete information stored in database and gain complete control over the application.

Photo WiFi Transfer 1.01 – Directory Traversal Vulnerability

A directory traversal web vulnerability has been discovered in the official BlueFinger Photo WiFi Transfer v1.01 iOS mobile application. The vulnerability allows remote attackers to bypass the path restriction of a service to access sensitive app-, web-server oder system files. The vulnerability is located in the `ftp` service of the application. Remote attackers are able to inject own malicious ftp commands to access restricted files and directories of the application.

ISPConfig 3 authenticated admin Localroot vulnerability

While logged in as admin user, add a shell user and set gid to ispconfig. Log in as that user and edit /usr/local/ispconfig/interface/lib/lang/en.lng with system($_GET['cmd']). Browse to http://server:8080/index.php?cmd=echo /tmp/script >>/usr/local/ispconfig/server/server.sh to create /tmp/script and put a command you wish to be executed as root. Browse to http://server:8080/index.php?cmd=chmod +x /usr/local/ispconfig/server/server.sh and http://server:8080/index.php?cmd=/usr/local/ispconfig/server/server.sh to execute the command as root.

TigerCom iFolder+ v1.2 iOS – Multiple Vulnerabilities

Multiple persistent input validation vulnerabilities are detected in the official TigerCom iFolder+ v1.2 iOS mobile application. The vulnerability allows remote attackers to inject malicious persistent script codes to application-side of the vulnerable service module. The vulnerability is located in the `name` and `password` value of the `login` module. Remote attackers are able to inject own malicious persistent script codes to the application-side of the vulnerable service module. The request method to inject is POST and the attack vector is located on the application-side.

Recent Exploits: