header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Allok Video Converter 4.6.1217 – Stack Overflow (SEH)

A stack-based buffer overflow vulnerability exists in Allok Video Converter 4.6.1217. An attacker can execute arbitrary code by copying the contents of poc.txt into the License Name input field of Allok Video Converter 4.6.1217. This will cause a stack-based buffer overflow, allowing the attacker to execute arbitrary code.

Advanced System Repair Pro 1.9.1.7 – Insecure File Permissions

Advanced System Repair Pro 1.9.1.7 is vulnerable to insecure file permissions. An attacker can exploit this vulnerability by compiling a malicious 'C' code and renaming the original 'AdvancedSystemRepairPro.exe' to '~AdvancedSystemRepairPro.exe'. The malicious code can then be placed in the Advanced System Repair Pro 1.9.1.7.0 directory. When a more privileged user connects and uses the AdvancedSystemRepairPro IDE, the attacker can gain privilege escalation.

Chevereto 3.13.4 Core – Remote Code Execution

Chevereto is vulnerable to Remote Code Execution due to an injection in the 'db_table_prefix' parameter. An attacker can inject malicious code into the 'db_table_prefix' parameter and execute arbitrary code on the server. This exploit has been tested on Ubuntu 19.10, PHP 7.3, Apache/2.4.41.

Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway – CVE-2019-19781

This exploit is used to execute arbitrary commands on vulnerable Citrix Application Delivery Controller and Citrix Gateway devices. It works by sending a malicious HTTP request to the vulnerable device, which then executes the command and stores the output in an XML file. The output can then be retrieved by sending another HTTP request to the vulnerable device.

PixelStor 5000 – Remote Code Execution

PixelStor 5000 is vulnerable to Remote Code Execution. An attacker can exploit this vulnerability by sending a maliciously crafted POST request to the languageOptions.php page. This will allow the attacker to execute arbitrary commands on the vulnerable system.

Recent Exploits: