header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Simple Inventory Management System v1.0 – SQL Injection Vulnerability

The Simple Inventory Management System v1.0 is susceptible to SQL Injection. The user inputs ($_POST['email'] and $_POST['pwd']) are directly inserted into the SQL query without adequate validation or sanitization, enabling potential manipulation by malicious users. This could lead to the injection of SQL code through specially crafted input, posing a significant security risk.

Flashcard Quiz App v1.0 – ‘card’ SQL Injection

The Flashcard Quiz App v1.0 is prone to SQL injection due to unsanitized user inputs directly concatenated into SQL queries. An attacker can manipulate the SQL query through the 'card' parameter in the URL, potentially leading to unauthorized actions on the database.

Attendance and Payroll System v1.0 – SQLi Authentication Bypass

Attendance and Payroll System v1.0 is vulnerable to an authentication bypass through SQL injection. An attacker can exploit this vulnerability by sending a specially crafted payload to the login page of the application. The payload will bypass the authentication and allow the attacker to access the application as an administrator.

Online Learning System 2.0 – ‘Multiple’ SQLi Authentication Bypass

Online Learning System v2.0 Login pages can be bypassed with a simple SQLi to the username/facultyID/studentID parameters. Steps To Reproduce: 1 - Go to one of the login portals 2 - Enter the payload to username field as 'bypass' or 1=1-- -' without double-quotes ('bypass' is can be anything in this scenario) and type anything you want to the password field. 3 - Click on 'Login' button and you are logged in as first user in database, which is admin user for admin portal.

Patient Appointment Scheduler System 1.0 – Persistent/Stored XSS

Patient Appointment Scheduler System v1.0 is vulnerable to a persistent/stored XSS vulnerability. An attacker can inject malicious JavaScript code into the 'about_us' field of the SystemSettings.php page, which is then stored in the database and executed when the main page is loaded. This can be used to steal user cookies, redirect users to malicious websites, or perform other malicious activities.

Patient Appointment Scheduler System 1.0 – Unauthenticated File Upload

Patient Appointment Scheduler System v1.0 is vulnerable to unauthenticated file upload. An attacker can upload a malicious file to the server and execute arbitrary code. This exploit was tested on Ubuntu 20.04.3 LTS (Focal Fossa) with XAMPP 8.0.10-0.

Responsive Tourism Website 3.1 – Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to gain remote code execution on a vulnerable Responsive Tourism Website 3.1. The attacker can bypass the login page by using a SQL injection payload and then upload a malicious PHP shell to the server. The attacker can then access the shell via the URL and execute arbitrary commands on the server.

Recent Exploits: