header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ticketly 1.0 – Multiple SQL Injection

Ticketly 1.0 are affected by SQL Injection in multiple parameters and resources through POST. This allows a attacker to read and modify sensitive information from the database used by the application. Proof of concept (PoC) includes two POST requests, one generating an error 500 and the other generating a code 200 OK. Payloads include a boolean-based blind and an error-based payload.

MariaDB Client 10.1.26 – Denial of Service (PoC)

MariaDB uses environment variables. The PAGER variable is vulnerable to a bufferoverflow. If the environment variable PAGER is greater or equals 512 characters it will crash and make client unusable. This is caused by a the function strmov which takes all from source and copy that into destination which have a fixed size.

Ricoh myPrint 2.9.2.4 – Hard-Coded Credentials

Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers and names of printed files.

WebOfisi E-Ticaret V4 – ‘urun’ SQL Injection

WebOfisi E-Ticaret V4 is a professional online shopping script with many features. Vulnerabilities have been discovered during penetration testing. The vulnerability is a SQL injection in the 'urun' parameter of the 'arama.html' page. The payloads used to exploit the vulnerability are boolean-based blind, error-based, stacked queries, and AND/OR time-based blind.

WordPress CherryFramework Themes 3.1.4 – Backup File Download

The CherryFramework Cherry theme 3.1.4 for WordPress allow remote attackers to obtain potentially sensitive information via wp-content/themes/CherryFramework/admin/data_management/ download_backup.php because it offers the option of a ZIP archive containing the entire content of the wp-content/themes directory.

MacOS 10.13 – ‘workq_kernreturn’ Denial of Service (PoC)

This exploit is a proof of concept for a denial of service vulnerability in MacOS 10.13 and iOS 11. The exploit uses the workq_kernreturn syscall to cause a panic in the system. The exploit is triggered by calling the workq_kernreturn syscall with the WQOPS_THREAD_WORKLOOP_RETURN option and any non-zero address.

POC Generator

POC Generator is a bash script that can be used to generate a proof-of-concept (POC) for a buffer overflow vulnerability. It takes a width and height as parameters and creates an XBM file with the given dimensions. It then modifies the XBM file to contain a buffer overflow payload. If the 'minimal' parameter is given, the script will shrink the payload to the minimal body size.

commit 6397fac4915a Increases the Number of Possible uid/gid Mappings

This vulnerability allows an attacker to gain the ability to override DAC security controls on files whose IDs aren't mapped in the user namespace. This is due to the fact that the new code omits the ID transformation for the kernel->namespaced mapping; only the namespaced->kernel mapping is transformed appropriately.

Recent Exploits: