header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Catch Themes Demo Import 1.6.1 – Remote Code Execution (RCE) (Authenticated)

The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.

joomla SQL Injection(com_awesom)

The Joomla component com_awesom is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'listid' parameter of the 'viewlist' task in the 'index.php' file. This allows the attacker to retrieve sensitive information from the database, such as usernames and passwords.

Auerswald COMpact 8.0B – Arbitrary File Disclosure

RedTeam Pentesting discovered a vulnerability in the web-based management interface of the Auerswald COMpact 5500R PBX which allows users with the "sub-admin" privilege to access any files on the PBX's file system.

MilleGPG5 5.7.2 Luglio 2021 (x64) – Local Privilege Escalation

By default, the Authenticated Users group has the modify permission to MilleGPG5 folders/files. A low privilege account can rename the mysqld.exe file located in the bin folder and replace it with a malicious file that would connect back to an attacking computer, giving system level privileges (nt authoritysystem) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file.

Online Enrollment Management System in PHP and PayPal 1.0 – ‘U_NAME’ Stored Cross-Site Scripting

This vulnerability allows an attacker to inject a malicious script permanently stored on the target server, such as in a database or comment field. The script is then executed when the victim retrieves the stored information, potentially allowing the attacker to steal sensitive data, such as cookies.

HTTPDebuggerPro 9.11 – Unquoted Service Path

The HTTPDebuggerPro software version 9.11 on Windows 10 x64 is vulnerable to an unquoted service path. This vulnerability allows an attacker to execute arbitrary code with elevated privileges by placing a malicious executable in a directory with a space in its name, leading to the service loading the malicious executable instead of the intended one.

Recent Exploits: