header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Batflat CMS 1.3.6 – Remote Code Execution (Authenticated)

Batflat CMS version 1.3.6 is vulnerable to authenticated remote code execution. An attacker can exploit this vulnerability by sending a malicious POST request to the add-user endpoint URL with the command to be executed. This vulnerability was discovered by mari0x00 and was assigned CVE-2020-35734.

Apport 2.20 – Local Privilege Escalation

This is a POC for Apport exploit, we exploited these bugs by launching a reverse shell to 127.0.0.1:1234. To compile the exploit code several packages are needed: sudo apt-get install build-essential nasm gcc. The reverse shell will connect on the next execution of logrotate.

Gitea 1.12.5 – Remote Code Execution (Authenticated)

Gitea is vulnerable to authenticated remote code execution. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable server. This vulnerability affects Gitea versions >= 1.1.0 to <= 1.12.5. The vulnerability is due to the lack of proper input validation in the 'user/settings/ssh' endpoint. An attacker can exploit this vulnerability to execute arbitrary code on the vulnerable server.

AgataSoft PingMaster Pro 2.1 – Denial of Service (PoC)

AgataSoft PingMaster Pro 2.1 is vulnerable to a denial of service attack. An attacker can create a malicious .txt file containing a large number of 'S' characters and then copy the content of the file into the 'Host name' field in the 'Trace Route' option of the program. This will cause the program to crash.

Managed Switch Port Mapping Tool 2.85.2 – Denial of Service (PoC)

Managed Switch Port Mapping Tool 2.85.2 is vulnerable to a denial of service attack. An attacker can create a file with a large amount of data and paste it into the IP Address and SNMP v1/v2c Read Community Name fields to cause a denial of service.

BlackCat CMS 1.3.6 – ‘Display name’ Cross Site Scripting (XSS)

To exploit this vulnerability an attacker has a login in the admin panel and clicks on the admin profile button. Then use " onmouseover=alert(1) " this XSS payload on Display name field and click on the Save button. Then refresh the page and hover the mouse on Display name filed and our XSS message pop up.

Online Internship Management System 1.0 – ’email’ SQL injection Auth Bypass

The application contains sql injections in the parameters 'email' and 'password' in the file 'login.php'. A curl request for authentication bypass via sql injection in parameter 'email' can be used to exploit the vulnerability.

Tasks 9.7.3 – Insecure Permissions

Any installed application on a victim's phone can add arbitrary tasks to users through insecure IPC handling. A malicious application has several ways of how to achieve that: 1. By sending multiple intents to ShareLink activity (com/todoroo/astrid/activity/ShareLinkActivity.java). Tasks application adds the first requested 'task' to the user's task list. 2. By sending an intent to VoiceCommand activity (org/tasks/voice/VoiceCommandActivity.java). The application does not validate intent's origin, so any application can append tasks to the user's task list. We used the Drozer application to emulate malicious app activity.

Recent Exploits: