header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Agares PhpAutoVideo v2.21 – Remote File Inclusion + Local File Inclusion

This exploit allows an attacker to include remote or local files in the vulnerable application. In the case of Local File Inclusion, an attacker can include files from the target system, potentially leading to information disclosure or remote code execution. In the case of Remote File Inclusion, an attacker can include arbitrary files from external servers, potentially leading to remote code execution.

AVS Audio Converter 9.1.2.600 – Stack Overflow (PoC)

This is a proof-of-concept exploit for a stack overflow vulnerability in AVS Audio Converter version 9.1.2.600. By providing a specially crafted payload in a file, an attacker can trigger a stack overflow and potentially execute arbitrary code.

HomeAutomation 3.3.2 – Authentication Bypass

The application suffers from an authentication bypass vulnerability when spoofing client IP address using the X-Forwarded-For header with the local (loopback) IP address value allowing remote control of the smart home solution.

1024 CMS 1.3.1 (LFI/SQL) Multiple Vulnerabilities

The vulnerability allows an attacker to perform SQL injection and local file inclusion attacks. In the SQL injection attack, an attacker can retrieve usernames and passwords from the database if magic_quotes_gpc is off. In the local file inclusion attack, an attacker can include arbitrary files from the system.

SolarWinds Kiwi Syslog Server 8.3.52 – ‘Kiwi Syslog Server’ Unquoted Service Path

The SolarWinds Kiwi Syslog Server 8.3.52 software has an unquoted service path vulnerability. This allows an attacker to place an executable named 'Archivos.exe' in the root directory and have it executed as the Local System user when the service is restarted.

phpMyRealty 1.0.x

The phpMyRealty 1.0.x script is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'type' parameter in the search.php file and the 'listing_updated_days' parameter in the findlistings.php file. This allows the attacker to retrieve sensitive information such as login credentials from the pmr_admins and pmr_users tables.

Kaseya VSA agent <= 9.5 privilege escalation

This exploit allows a low privileged group to gain excessive permissions to a folder used by an elevated process in Kaseya VSA agent <= 9.5. By appending malicious code to a script file dropped in the default working directory, an attacker can execute arbitrary commands as SYSTEM.

Recent Exploits: