header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Maitra – Mail Tracking System 1.7.2 – SQL Injection / Database File Download

The Maitra - Mail Tracking System 1.7.2 is vulnerable to SQL Injection and allows an attacker to download the database file. The vulnerability can be exploited by accessing the /application/db/maitra.sqlite file or by using the /?c=outmail&m=outmailentry&mailid=[SQL] endpoint with a malicious SQL query.

MS07-055 Kodak Image Viewer TIF/TIFF Code Execution Proof Of Concept

This is a proof of concept exploit for the MS07-055 vulnerability in the Kodak Image Viewer. By opening a specially crafted TIF/TIFF file, an attacker can execute arbitrary code on the target system. The exploit has been tested on Windows 2000 SP4 Korean Edition, but it may work on other systems with slight modifications. It is advised to open the file through the Kodak Image Viewer rather than directly in explorer to avoid crashes.

Data Center Audit 2.6.2 – Cross-Site Request Forgery (Update Admin)

The Data Center Audit 2.6.2 software is vulnerable to Cross-Site Request Forgery (CSRF). An attacker can exploit this vulnerability by tricking an authenticated user into visiting a malicious website that contains a crafted request to update the admin password. This can lead to unauthorized access and potential compromise of the system.

Sony CONNECT Player M3U Playlist Processing Stack Buffer Overflow

This exploit takes advantage of a stack buffer overflow vulnerability in Sony CONNECT Player M3U Playlist Processing. It allows an attacker to execute arbitrary code on the target system by crafting a malicious M3U playlist file. The exploit was discovered by Parvez Anwar and written by TaMBaRuS. It has been tested on Sony CONNECT Player (SonicStage) 4.x installed on Windows XP SP2/2k SP4. The exploit contains shellcode that executes a Windows command provided by metasploit.com. This exploit is for educational purposes only.

XAMPP Control Panel 3.2.2 – Buffer Overflow (SEH) (Unicode)

This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in XAMPP Control Panel version 3.2.2. The exploit involves creating a specially crafted file and pasting its contents into the 'Editor' field in the program.

D-LINK Central WifiManager CWM-100 – Server-Side Request Forgery

Using a web browser or script SSRF can be initiated against internal/external systems to conduct port scans by leveraging D-LINKs MailConnect component. The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI. This can undermine accountability of where scan or connections actually came from and or bypass the FW etc. This can be automated via script or using Web Browser.

Paroiciel 11.20 – ‘tRecIdListe’ SQL Injection

The Paroiciel 11.20 software is vulnerable to SQL injection. An attacker can exploit this vulnerability by injecting SQL code into the 'tRecIdListe' parameter of the 'trec.php' page. This can lead to unauthorized access to the database and potential data manipulation.

TufinOS 2.17 Build 1193 – XML External Entity Injection

The SecureTrack application is vulnerable to XML External Entity injection. This attack is considered quite serious and can be used to retrieve confidential data, perform denial of service, execute server side request forgery attacks, and perform port scanning through the machine on other systems. The vulnerability exists in the 'Audit' > 'Best Practices' module of the 'SecureTrack' application when creating a new Best Practices query and manipulating the 'xml' parameter in the request. When triggered, the vulnerability writes the contents of the requested file inside the name field of a best practice. This vulnerability affects every 'SecureTrack' application authentication user role.

Recent Exploits: