header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Aerospike Database 5.1.0.3 – OS Command Execution

A vulnerability in Aerospike Database 5.1.0.3 allows an attacker to execute arbitrary OS commands on the vulnerable system. This is due to the lack of proper input validation when handling user-supplied data. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable system. Successful exploitation of this vulnerability can lead to complete compromise of the vulnerable system.

Huawei LCD_Service 1.0.1.0 – ‘LCD_Service’ Unquote Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Online Doctor Appointment Booking System PHP and Mysql 1.0 – ‘q’ SQL Injection

An SQL injection vulnerability was discovered in PHP-Doctor-Appointment-System. In getuser.php file, GET parameter 'q' is vulnerable. The vulnerability could allow for the improper neutralization of special elements in SQL commands and may lead to the product being vulnerable to SQL injection.

Cisco 7937G 1-4-5-7 – DoS/Privilege Escalation

This exploit is a python script that can be used to launch a DoS attack or privilege escalation attack on Cisco 7937G devices running SIP-1-4-5-5 or SIP-1-4-5-7. The script takes a target IP address, attack type, username, and password as arguments. Attack type 1 is a DoS attack with automatic device reset, attack type 2 is a DoS attack without automatic device reset, and attack type 3 is a privilege escalation attack that changes the SSH credentials of the target device.

Atheros Coex Service Application 8.0.0.255 -‘ZAtheros Bt&Wlan Coex Agent’ Unquoted Service Path

Atheros Coex Service Application 8.0.0.255 has an unquoted service path. The PoC shows that the service 'ZAtheros Bt&Wlan Coex Agent' is running with an unquoted service path. The service is set to auto start.

KiteService 1.2020.1113.1 – ‘KiteService.exe’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

October CMS Build 465 – Arbitrary File Read Exploit (Authenticated)

This exploit allows an authenticated user to read arbitrary files from the October CMS <= Build 465. The exploit requires the user to have the privilege to modify assets and a valid cookie value. The relative path to the target file is required to exploit the vulnerability.

Recent Exploits: