header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Examination System Project 1.0 – Cross-site request forgery (CSRF)

Online Examination System Project <=1.0 versions (PHP/MYSQL) are vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious link that, when clicked by an admin user, will delete a user account from the database without the admin’s consent. This is possible because the application uses GET requests to perform account deletion and does not implement any CSRF protection mechanism. The email of the user to be deleted is passed as a parameter in the URL, which can be manipulated by the attacker. This could result in loss of data.

WordPress Theme Workreap 2.2.2 – Unauthenticated Upload Leading to Remote Code Execution

The WordPress Theme Workreap version 2.2.2 is vulnerable to an unauthenticated file upload vulnerability, which can lead to remote code execution. By exploiting this vulnerability, an attacker can upload a malicious PHP file to the target server and execute arbitrary code.

Thruk Monitoring Web Interface 3.06 – Path Traversal

This exploit allows an attacker to access files and directories outside of the intended directory on the Thruk Monitoring Web Interface version 3.06 or earlier. The vulnerability occurs due to insufficient input validation in the application.

USB Flash Drives Control 4.1.0.0 – Unquoted Service Path

The USB Flash Drives Control software version 4.1.0.0 is vulnerable to an unquoted service path vulnerability. This allows an attacker to gain elevated privileges by placing a malicious executable in a directory with spaces in its name.

Tree Page View Plugin 1.6.7 – Cross Site Scripting (XSS)

The CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7. This is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed.

STARFACE 7.3.0.10 – Authentication with Password Hash Possible

The web interface of the STARFACE PBX in version 7.3.0.10 allows for authentication with a password hash. The JavaScript file 'prettifier.js' adds the 'secret' and 'ack' parameters to the login form before submission. The 'defaultVals' JavaScript object contains the static hash of the PBX version.

Enrollment System Project v1.0 – SQL Injection Authentication Bypass (SQLI)

Enrollment System Project V1.0, developed by Sourcecodester, has been found to be vulnerable to SQL Injection (SQLI) attacks. This vulnerability allows an attacker to manipulate the SQL queries executed by the application. The system fails to properly validate user-supplied input in the username and password fields during the login process, enabling an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass authentication and gain unauthorized access to the system.

Recent Exploits: