header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OVOO Movie Portal CMS v3.3.3 – SQL Injection

This exploit allows an attacker to perform SQL injection on OVOO Movie Portal CMS v3.3.3. The vulnerability exists in the 'maximum_rating' parameter of the 'filter_movies' endpoint, allowing an attacker to manipulate the SQL query and potentially gain unauthorized access to the database.

Global – Multi School Management System Express v1.0- SQL Injection

The Global - Multi School Management System Express v1.0 is vulnerable to SQL Injection. The vulnerability exists in the 'school_id' parameter of the '/report/balance' endpoint. An attacker can exploit this vulnerability by injecting malicious SQL code in the 'school_id' parameter, allowing them to extract sensitive information from the database or manipulate the database.

Color Prediction Game v1.0 – SQL Injection

The Color Prediction Game v1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'login_mobile' parameter. This allows the attacker to manipulate the database and potentially retrieve sensitive information.

PHPJabbers Business Directory Script v3.2 – Multiple Vulnerabilities

The PHPJabbers Business Directory Script v3.2 is vulnerable to Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks. An attacker can exploit these vulnerabilities to perform malicious actions or steal sensitive information.

EuroTel ETL3100 – Transmitter Unauthenticated Config/Log Download

The TV and FM transmitter suffers from an unauthenticated configuration and log download vulnerability. This will enable the attacker to disclose sensitive information and help him in authentication bypass, privilege escalation and full system access.

Inosoft VisiWin 7 2022-2.1 – Insecure Folders Permissions Privilege Escalation

The installation of Inosoft VisiWin 7 creates insecure folders with incorrect permissions. This allows a malicious user to manipulate file content or change legitimate files to compromise a system or gain elevated privileges.

Recent Exploits: