header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bus Reservation System-1.1 Multiple-SQLi

The `pickup_id` parameter in the Bus Reservation System version 1.1 is vulnerable to SQL injection attacks. An attacker can exploit this vulnerability to steal information from the database. The payload for exploiting the vulnerability is provided in the description.

WP Statistics Plugin <= 13.1.5 current_page_id - Time based SQL injection (Unauthenticated)

This exploit targets the WP Statistics Plugin version 13.1.5 and prior. It allows an unauthenticated attacker to perform a time-based SQL injection attack by manipulating the 'current_page_id' parameter in the '/wp-json/wp-statistics/v2/hit' endpoint. The vulnerability can be exploited to cause a delay in the response time of the target server, indicating a successful injection.

Member Login Script 3.3 – Client-side desync

The server appears to be vulnerable to client-side desync attacks. A POST request was sent to the path '/1692959852_473/index.php' with a second request sent as the body. The server ignored the Content-Length header and did not close the connection, leading to the smuggled request being interpreted as the next request.

DLINK DPH-400SE – Exposure of Sensitive Information

With default credential for the guest user "guest:guest" to login on the web portal, the guest user can head to maintenance tab under access and modify the users which allows guest user to modify all users as well as view passwords for all users.

FileMage Gateway 1.10.9 – Local File Inclusion

The FileMage Gateway version 1.10.9 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability to include arbitrary files from the server, potentially leading to remote code execution.

Recent Exploits: