header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Duplicate Cleaner Pro 4 – Denial of Service (PoC)

The exploit creates a large buffer filled with 'A' characters and attempts to write it to a file named 'Evil.txt'. If successful, the exploit will cause the Duplicate Cleaner Pro software to crash when the content of 'Evil.txt' is pasted into the 'License key' field and the 'Activate' button is clicked.

Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 – ‘Key’ Denial of Service (PoC)

This exploit allows an attacker to crash the Backup Key Recovery software by providing a specially crafted 'Key' value. By running a python script, a file (poc.txt) is created with a payload of 1000 'A' characters. When the software is launched and the payload is copied into the 'Key' field, the software crashes.

Dnss Domain Name Search Software – ‘Name’ Denial of Service (PoC)

The Dnss Domain Name Search Software is prone to a denial-of-service (DoS) vulnerability. This allows remote attackers to crash the application by providing a specially crafted value for the 'Name' field. A proof-of-concept (PoC) exploit is provided in the form of a Python script that creates a file containing a payload of 1000 characters and causes the application to crash when the payload is copied into the 'Name' field.

AuraCMS 2.2 – (admin_users.php) Remote Add Administrator Exploit

This exploit allows an attacker to remotely add an administrator to the AuraCMS 2.2 system. By bypassing the 'admin_users.php' file's direct access prevention, the attacker can execute arbitrary code and gain administrative privileges. The vulnerability lies in the 'cek_login()' function, which checks the login status through session cookies and allows access to 'admin_users.php' for users with any level of login.

Adaware Web Companion 4.9.2159 – ‘WCAssistantService’ Unquoted Service Path

The Adaware Web Companion version 4.9.2159 is vulnerable to an unquoted service path vulnerability. The 'WCAssistantService' service has a binary path name that is not properly quoted. This could allow an attacker to execute arbitrary code with elevated privileges if they are able to place a malicious executable in the same directory as the service executable.

TeamCal Pro <= 3.1.000 Multiple RFI / LFI Vulnerabilities

Multiple Remote File Inclusion (RFI) and Local File Inclusion (LFI) vulnerabilities exist in TeamCal Pro version 3.1.000 and earlier. These vulnerabilities allow an attacker to include arbitrary remote or local files, potentially leading to remote code execution or information disclosure.

SpotFTP FTP Password Recovery 3.0.0.0 – ‘Key’ Denial of Service (PoC)

The SpotFTP FTP Password Recovery software version 3.0.0.0 is vulnerable to a denial of service attack. By providing a specially crafted input in the 'Key' field, an attacker can cause the software to crash, resulting in a denial of service condition.

Recent Exploits: