header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Seotheme – Remote Code Execution Unauthenticated

The exploit allows remote attackers to execute arbitrary code on the target system without authentication. The vulnerability is due to improper input validation in the Wordpress Seotheme. The exploit code provided in the script allows attackers to upload a web shell and gain control over the target system.

Lot Reservation Management System Unauthenticated File Upload and Remote Code Execution

The Lot Reservation Management System allows unauthenticated users to upload files, which can lead to remote code execution. By exploiting this vulnerability, an attacker can upload malicious files containing code that can be executed on the server, potentially leading to unauthorized access, data theft, or further compromise of the system.

R Radio Network FM Transmitter 1.07 system.cgi Password Disclosure

The R Radio Network FM Transmitter 1.07 system.cgi endpoint has an improper access control issue that allows unauthenticated users to access and view the clear-text password of the admin user, enabling them to bypass authentication and access FM station setup.

GoAhead Web Server 2.5 – ‘goform/formTest’ Multiple HTML Injection Vulnerabilities

Multiple HTML injection vulnerabilities are found in GoAhead Web Server version 2.5 due to insufficient input validation. Exploiting this vulnerability allows an attacker to inject and execute HTML code within the context of the affected site.

Online Shopping System Advanced SQL Injection Vulnerability

An SQL injection vulnerability in Online Shopping System Advanced allows attackers to gain unauthorized access to the database by injecting malicious SQL statements through the 'cm' parameter. This can lead to the disclosure of sensitive information like user credentials.

101 News-1.0 Multiple-SQLi

The searchtitle parameter in 101 News-1.0 is vulnerable to SQL injection attacks. By submitting a specific payload in the searchtitle parameter, an attacker can inject a SQL sub-query that calls MySQL's load_file function with a UNC file path pointing to an external domain. This allows the attacker to interact with the external domain, confirming the successful execution of the injected SQL query.

Incorrect Access Control Vulnerability in WyreStorm APOLLO VX20 Devices

A vulnerability was found in WyreStorm Apollo VX20 devices prior to version 1.3.58, allowing remote attackers to trigger a device restart through an HTTP GET request to /device/reboot endpoint. This vulnerability is identified as CVE-2024-25736.

Recent Exploits: