This exploit is a proof of concept for a denial of service vulnerability in the Virgin Media Hub 3.0 Router. The exploit sends a malicious HTTP request to the target router, which causes it to crash. No CVE is associated with this vulnerability.
This code exploits two vulnerabilities to gain remote code execution with Administrator privileges: CVE-2018-15707 to steal credentials (XSS). User-interaction required. CVE-2018-15705 to write an ASP file to the server.
CdCatalog 2.3.1 is vulnerable to a denial of service attack when a maliciously crafted .hcf file is opened. By creating a file with a length of 21 bytes, the application will crash when the file is opened.
WinMTR 0.91 is vulnerable to a Denial of Service attack when a maliciously crafted exp.txt file is opened. When the file is opened, the application crashes.
Yot CMS 3.3.1 is vulnerable to SQL Injection. An attacker can inject malicious SQL queries via the 'aid' and 'cid' parameters in the 'index.php' page. This can be exploited to dump the database contents.
An attacker can gain access to all the database information using filter_by[CommentCreatedFrom] and filter_by[5BCommentCreatedTo] parameters.
Gate Pass Management System 2.1 is vulnerable to SQL Injection. An attacker can send a specially crafted HTTP POST request to the login-exec.php script with malicious SQL statements in the 'login' and 'password' parameters to execute arbitrary SQL commands in the application's database.
CSV (XLS) Injection (Excel Macro Injection or Formula Injection) exists in the AIM CrossChex 4.3 when importing or exporting users using xls Excel file. This can be exploited to execute arbitrary commands on the affected system via SE attacks when an attacker inserts formula payload in the 'Name' field when adding a user or using the custom fields 'Gender', 'Position', 'Phone', 'Birthday', 'Employ Date' and 'Address'. Upon importing, the application will launch Excel program and execute the malicious macro formula.
The application /1.0/users/authentication/rest/signin is vulnerable to SQL injection. Vulnerable application Header field: Host:' AND 8494=8494-- ttWV. Payload:' AND 8494=8494-- ttWV.
Fantastic Blog CMS version 1.0 is vulnerable to SQL injection. The application does not properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. This can allow the attacker to view, add, modify or delete data from the database.