header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Job Portal 1.0 – Cross Site Request Forgery (Add User)

Online Job Portal 1.0 is vulnerable to Cross Site Request Forgery (CSRF) attacks. An attacker can exploit this vulnerability by sending a malicious request to the vulnerable application. In the first POC, an attacker can send a malicious request to the vulnerable application to add a new user with administrator privileges. In the second POC, an attacker can send a malicious request to the vulnerable application to edit an existing user with administrator privileges.

RarmaRadio 2.72.4 – ‘username’ Denial of Service (PoC)

RarmaRadio 2.72.4 is vulnerable to a denial of service attack when a maliciously crafted username is used. By running the python code 'rarmaradio_username.py', a text file containing a buffer of 5000 'A' characters is created. When this text file is copied to the clipboard and pasted into the 'Username' field in the 'Network' settings, the application will crash.

Online Job Portal 1.0 – Remote Code Execution

An attacker can exploit a vulnerability in Online Job Portal 1.0 to execute arbitrary code on the vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'mealid' parameter of the 'index.php' script. An attacker can send a specially crafted HTTP request containing an arbitrary PHP code in the 'mealid' parameter to execute arbitrary code on the vulnerable system.

TapinRadio 2.12.3 – ‘address’ Denial of Service (PoC)

TapinRadio 2.12.3 is vulnerable to a denial of service attack when a maliciously crafted 'address' field is supplied. An attacker can exploit this vulnerability by running a python code to generate a maliciously crafted 'address' field, copying the content to clipboard, opening TapinRadio, selecting 'Settings' > 'Preferences' > 'Miscellaneous', selecting 'Set Application Proxy...', pasting the clipboard in the 'Address' field, typing '444' in the 'Port' field, typing 'test' in the 'Username' field, typing '1234' in the 'Password' field, selecting 'OK' and 'OK', which will cause the application to crash.

AbsoluteTelnet 11.12 – ‘SSH2/username’ Denial of Service (PoC)

AbsoluteTelnet 11.12 is vulnerable to a denial of service attack when a specially crafted username is used in an SSH2 connection. By sending a large string of 'A' characters as the username, the application will crash.

AbsoluteTelnet 11.12 – “license name” Denial of Service (PoC)

A denial of service vulnerability exists in AbsoluteTelnet 11.12 when a maliciously crafted license name is entered, resulting in a crash. An attacker can exploit this vulnerability by running a python code to generate a maliciously crafted license name, copying the content to clipboard, opening AbsoluteTelnet.exe, selecting Help > Enter License Key, and pasting the clipboard in the License Name field.

Recent Exploits: