header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

django_cve_2019_19844_poc

This PoC exploits a vulnerability in Django which allows an attacker to bypass authentication by using a specially crafted email address. The attacker can use this vulnerability to reset the password of any user in the system and gain access to their account.

Microsoft Outlook VCF cards – Denial of Service (PoC)

Windows VCF cards do not properly sanitize email addresses allowing for HTML injection. A corrupt VCF card can cause all the users currently opened files and applications to be closed and their session to be terminated without requiring any accompanying attacker supplied code. This can be done by crafting the Mailto link to point to Windows 'logoff.exe'. The corrupt VCF card can then kill all users applications and also log the target off their computer, if the VCF card is opened in using Windows Contacts and the link is clicked.

Voyager 1.3.0 – Directory Traversal

Voyager 1.3.0 and bellow is vulnerable to Directory Traversal. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'path' parameter of the '/admin/voyager-assets' URL. A remote attacker can send a specially crafted request to the vulnerable application and gain access to arbitrary files on the server, including the Laravel environment file. This can lead to further attacks such as remote code execution.

FTPGetter Professional 5.97.0.223 – Denial of Service (PoC)

The FTPGetter Professional v.5.97.0.223 FTP client suffers from a NULL pointer dereference vulnerability via the program not properly handling user input when setting the field 'Run program' under profile properties, it triggers when executing the profile.

SpotFTP FTP Password Recovery 3.0.0.0 – ‘Name’ Denial of Service (PoC)

SpotFTP FTP Password Recovery 3.0.0.0 is vulnerable to a denial of service attack when a maliciously crafted input is sent to the 'Name' field. An attacker can exploit this vulnerability by creating a file (poc.txt) containing a large number of characters and then copying and pasting the characters in the 'Name' field, which will cause the application to crash.

Recent Exploits: