header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Clansphere CMS 2011.4 – Stored Cross-Site Scripting (XSS)

Clansphere CMS 2011.4 is vulnerable to stored cross-site scripting (XSS) attacks. An attacker can exploit this vulnerability by creating a malicious payload and entering it into the username field of the buddy list creation page. When a user visits the page, the malicious payload will be executed.

FlatCore CMS 2.1.1 -Stored Cross Site Scripting

FlatCore CMS 2.1.1 is vulnerable to Stored Cross Site Scripting. An attacker can inject malicious JavaScript code into the username field of the user account, which will be executed when the user visits the page. The malicious code can be used to steal user credentials, hijack user sessions, redirect users to malicious websites, etc.

eXtplorer<= 2.1.14 – Authentication Bypass & Remote Code Execution (RCE)

eXtplorer authentication mechanism allows an attacker to login into the Admin Panel without knowing the password of the victim, but only its username. This vector is exploited by not supplying password in POST request.

Gestionale Open 12.00.00 – ‘DB_GO_80’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Mediconta 3.7.27 – ‘servermedicontservice’ Unquoted Service Path

A successful attempt would require the local user to be able to insert their code in the system root path undetected by the OS or other security applications where it could potentially be executed during application startup or reboot. If successful, the local user's code would execute with the elevated privileges of the application.

Canteen-Management v1.0 – SQL Injection

The username parameter from Canteen-Management1.0-2022 appears to be vulnerable to SQL injection attacks. The malicious user can attack remotely this system by using this vulnerability to steal all information from the database of this system.

Canteen-Management v1.0 – XSS-Reflected

The name of an arbitrarily supplied URL parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The attacker can craft a very malicious HTTPS URL redirecting to a very malicious URL. When the victim clicks into this crafted URL the game will over for him.

PHPGurukul Online Birth Certificate System V 1.2 – Blind XSS

PHPGurukul Online Birth Certificate System V 1.2 is vulnerable to Blind XSS. An attacker can exploit this vulnerability by navigating to http://localhost/Birth%20Certificate%20System/obcs/user/fill-birthregform.php, filling the form and entering an XSS payload in the address field. When the admin clicks on the request to verify the form, the XSS payload gets fired and the attacker can get the details of the victim like IP address, cookies, etc.

Composr-CMS Version <=10.0.39 – Authenticated Remote Code Execution

An authenticated remote code execution vulnerability exists in Composr-CMS version &lt;=10.0.39. An attacker can exploit this vulnerability by disabling the php file uploading protection and uploading a malicious php shell. This can be done by sending a POST request to the commandr.php page with the command to delete the .htaccess file. This will disable the protection and allow the attacker to upload a malicious php shell.

Abantecart v1.3.2 – Authenticated Remote Code Execution

Abantecart v1.3.2 is vulnerable to authenticated remote code execution. An attacker can abuse the functionality of the Media Manager to upload a malicious PHP web shell and execute it in the browser. This will give the attacker a reverse shell with the privileges of the daemon user.

Recent Exploits: