header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Railway Reservation System 1.0 – ‘Multiple’ Stored Cross Site Scripting (XSS) (Unauthenticated)

Online Railway Reservation System 1.0 is vulnerable to multiple stored cross-site scripting (XSS) attacks. An unauthenticated attacker can inject malicious JavaScript code into the 'about_us' and 'train_code' parameters of the application, which will be stored in the application's database. When a user visits the 'about_us' or 'train' page, the malicious JavaScript code will be executed in the user's browser.

Online Railway Reservation System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

A vulnerability exists in the Online Railway Reservation System 1.0, which allows an unauthenticated attacker to execute arbitrary code on the vulnerable system. This is achieved by sending a malicious POST request to the SystemSettings.php file, which contains a payload that is executed by the vulnerable system. The attacker can then view the output of the command by sending a GET request to the orrs/ directory.

Online Railway Reservation System 1.0 – ‘id’ SQL Injection (Unauthenticated)

SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to it's database. Online Railway Reservation System v1.0 is vulnerable to SQL injection via the 'id' parameter on the Reservation Form. An attacker can compromise the database of the application using some automated(or manual) tools like SQLmap. Steps of reproduce: Step-1: Navigate to 'Schedule' > go to 'Book' or 'Revervation Form' page using the following URL: http://localhost/orrs/?page=reserve&sid=1 Step-2: Put the SQL Injection payloads in 'id' field. In this we used time-based blind payload: /orrs/?page=reserve&sid=1') AND (SELECT 6842 FROM (SELECT(SLEEP(5)))UsWr) AND ('WBCm'='WBCm Step-3: Now, the Server target accepted our payload and the response got delayed by 5 seconds.

Online Veterinary Appointment System 1.0 – ‘Multiple’ SQL Injection

SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. Online Veterinary Appointment System 1.0 is vulnerable to 'Multiple' SQL injections.

WordPress Plugin AAWP 3.16 – ‘tab’ Reflected Cross Site Scripting (XSS) (Authenticated)

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'tab' parameter of the 'admin.php' script. A remote authenticated attacker can execute arbitrary HTML and script code in a browser in the context of the vulnerable website. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Gerapy 0.9.7 – Remote Code Execution (RCE) (Authenticated)

Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8. An attacker can exploit this vulnerability by sending a malicious payload to the application which will execute arbitrary code on the server.

TermTalk Server 3.24.0.2 – Arbitrary File Read (Unauthenticated)

TermTalk Server 3.24.0.2 is vulnerable to an unauthenticated arbitrary file read. An attacker can send a specially crafted HTTP request to the server to read any file on the system. This can be done by sending a request to the ‘/file’ endpoint with the ‘valore’ parameter set to the path of the file to be read. For example, sending a request to ‘/file?valore=../../../../WINDOWS/System32/drivers/etc/hosts’ will return the contents of the ‘hosts’ file.

Recent Exploits: