header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Monstra CMS 3.0.3 – Privilege Escalation / Remote Password Change

Any user can change credentials of other users including the Administrator credentials. This can allow the attacker to gain Administrator access and completely compromise the application. Once logged in as a regular user or successfully registering as a new user, use the following URL to gain information (username) of other users: http://localhost/monstra-3.0.3/users/1. The digit '1' is of Admin or first user created in the database. By changing the digit, all registered usernames can be found. Then by using the 'Edit Profile' option of own user account, password of any other user including the Administrator can be changed by changing the POST parameters 'user_id', 'login' and 'new_password'.

AKIPS Network Monitor 15.37-16.6 OS Command Injection

The 'username' login parameter allows for OS Command injection via command Injection during a failed login attempt returns the command injection output to a limited login failure field. By using concatenation '||' a command may be appended to the username.

CVE-2015-7562 TeamPass 2.1.24 Persistant XSS

When displaying the detail of an item (a password entry), the 'label' value is display using the stripslashes() sanitization function. This function does not efficiently prevent XSS. POC of a persistant XSS: add item with label: $str = "' onclick='javascript:alert("XSS found");' alt='";echo "<a href='". strip_tags($str) ."'></a>"; This xss will be trigger each time a user click on this item. As item can be share, there is a way for a user to trick an admin to trigger this xss. fix in commit cd112ea (see https://github.com/nilsteampassnet/TeamPass/pull/1140). POC of a persistant XSS: Add a new role with name: <script>alert("XSS found");</script> This xss will be trigger each time a user click on this role.

WordPress Site Import 1.0.1 | Local and Remote file inclusion

WordPress Site Import 1.0.1 is vulnerable to both local and remote file inclusion. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable parameter 'url' in the page.php file. This can be used to execute arbitrary code on the server.

Zortam Mp3 Media Studio 20.15 – SEH overflow DOS

Zortam Mp3 Media Studio is a program that changes tags sound file. If the tag length is over a certain length, the program will crash. An mp3 file with a title tag length of 3000 can be created to cause the program to crash. This exploit was tested on Windows7 Professional SP1 En x86.

Local RedHat Enterprise Linux DoS â?? RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver)

The Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the iowarrior driver. The bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo (github.com/schumilo) using the following device descriptor: [bLength: 0x12, bDescriptorType: 0x1, bcdUSB: 0x200, bDeviceClass: 0x3, bDeviceSubClass: 0x0, bDeviceProtocol: 0x0, bMaxPacketSize: 0x40, idVendor: 0x7c0, idProduct: 0x1500, bcdDevice: 0x100, iManufacturer: 0x1, iProduct: 0x2, iSerialNumbers: 0x3, bNumConfigurations: 0x1]. This is the configuration descriptor containing the malicious value for bNumEndpoints causing the crash. A zero value for bNumEndpoints crashes the system.

OS-S Security Advisory 2016-17 Linux snd-usb-audio Multiple Free

The Kernel 3.10.0-229.20.1.el7.x86_64 crashes on presentation of a buggy USB device requiring the snd-usb-audio driver. The bug was found using the USB-fuzzing framework vUSBf from Sergej Schumilo (github.com/schumilo) using the following device descriptor: [bLength: 0x12, bDescriptorType: 0x1, bcdUSB: 0x200, bDeviceClass: 0x3, bDeviceSubClass: 0x0, bDeviceProtocol: 0x0, bMaxPacketSize: 0x40, idVendor: 0x582, idProduct: 0x0, bcdDevice: 0x100, iManufacturer: 0x1, iProduct: 0x2, iSerialNumbers: 0x3, bNumConfigurations: 0x1]. This is the configuration descriptor containing the malicious value for bNumEndpoints causing the crash. A zero value for bNumEndpoints crashes the system (multiple free).

WordPress DZS Videogallery Plugin – Multiple Vulnerabilities <=8.60

The DZS Videogallery Plugin for Wordpress contains multiple vulnerabilities that allow an unauthenticated attacker to perform Cross-Site Request Forgery (CSRF) and Cross-Site Scripting (XSS) attacks. The vulnerabilities exist due to the lack of proper sanitization of user-supplied input in the 'initer' and 'width' parameters of the 'popup.php' and 'ajax.php' scripts, respectively. An attacker can exploit these vulnerabilities by enticing an authenticated user to follow a malicious link or visit a malicious page.

WordPress Beauty Theme File Upload Vulnerability v1.0.8

The Beauty Premium theme contains a contact form that is vulnerable to CSRF and File Upload vulnerability in the sendmail.php file. The file attachment gets uploaded to the wordpress upload directory and it is not sanitized, allowing attackers to upload harmful code.

Recent Exploits: