header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows 10 v21H1 – HTTP Protocol Stack Remote Code Execution

The Windows 10 version 2004 is vulnerable to the HTTP Protocol Stack (HTTP.sys) due to a buffer overflow. This vulnerability allows an attacker to perform a denial of service (DoS) attack and restart the system. The vulnerability was first reported in CVE-2021-31166 and still exists in Windows 10 version 2004. The exploit for this vulnerability is a one-line command.

Microsoft Outlook Microsoft 365 MSO (Version 2306 Build 16.0.16529.20100) 32-bit – Remote Code Execution

The Microsoft Outlook app allows an attacker to send an infected Word file with malicious content to everyone who is using the Outlook app, regardless of whether it is the web or local version. Microsoft has not yet released a patch for this 0-day vulnerability.

Faculty Evaluation System v1.0 – SQL Injection

The Faculty Evaluation System v1.0 is vulnerable to SQL Injection. The vulnerability exists in the 'edit_evaluation' file and the 'view_faculty.php' file. The SQL Injection allows an attacker to manipulate the SQL queries and potentially extract or modify sensitive data.

Piwigo v13.7.0 – Stored Cross-Site Scripting (XSS) (Authenticated)

The Piwigo version 13.7.0 is vulnerable to a stored cross-site scripting (XSS) attack. An authenticated user with the privilege to upload photos can inject malicious code into the 'Description' field of the photo editing screen. When the photo is viewed on the homepage, the XSS payload is executed.

Microsoft Edge 114.0.1823.67 (64-bit) – Information Disclosure

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is data inside the targeted website like IDs, tokens, nonces, cookies, IP, User-Agent, and other sensitive information. The user would have to click on a specially crafted URL to be compromised by the attacker. In this example, the attacker uses STRIDE Threat Modeling to spoof the victim to click on his website and done. This will be hard to detect.

Lost and Found Information System v1.0 – SQL Injection

This exploit allows an attacker to perform SQL injection on the Lost and Found Information System v1.0. By injecting a malicious SQL query, the attacker can manipulate the database and potentially access unauthorized information.

Beauty Salon Management System v1.0 – SQLi

The Beauty Salon Management System v1.0 developed by Campcodes is vulnerable to SQL Injection attacks. This allows an attacker to manipulate login authentication with SQL queries and bypass authentication. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system.

Recent Exploits: