header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Library System in PHP 1.0 – ‘publisher name’ Stored Cross-Site Scripting (XSS)

Library System in PHP V1.0 is vulnerable to stored cross site scripting because of insufficient user supplied data sanitisation. An attacker can exploit this vulnerability by entering a malicious payload in the publisher field and clicking on Save. The payload will be stored in the database and executed when the page is loaded.

WordPress Plugin The True Ranker 2.2.2 – Arbitrary File Read (Unauthenticated)

The True Ranker plugin for WordPress is vulnerable to an unauthenticated arbitrary file read vulnerability. An attacker can send a specially crafted request to the vulnerable endpoint and read arbitrary files from the server.

Online Admission System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the target system. The exploit works by uploading a malicious PHP script to the target system, which is then executed by the web server. The malicious script then creates a reverse shell to the attacker's machine, allowing them to execute arbitrary commands on the target system.

Movie Rating System 1.0 – SQLi to RCE (Unauthenticated)

This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable system by exploiting a SQL injection vulnerability in the Movie Rating System 1.0. The attacker can craft a malicious SQL query to inject malicious code into the vulnerable system, which can then be executed by the web server.

Movie Rating System 1.0 – Broken Access Control (Admin Account Creation) (Unauthenticated)

This exploit allows an unauthenticated user to create an admin account on the Movie Rating System 1.0 application. The exploit is achieved by sending a POST request to the classes/Users.php?f=save endpoint with the required parameters. Once the admin account is created, the attacker can log in to the application using the credentials provided.

ConnectWise Control 19.2.24707 – Username Enumeration

ConnectWise Control 19.2.24707 is vulnerable to username enumeration. An attacker can use this vulnerability to enumerate valid usernames on the system. This exploit is based on the payloads and headers used in the requests. The exploit uses multiprocessing to speed up the enumeration process.

WordPress Plugin Contact Form Entries 1.1.6 – Cross Site Scripting (XSS) (Unauthenticated)

Contact Form Entries < 1.1.7 is vulnerable to Unauthenticated Stored Cross-Site Scripting. When the user uploads a new form, CRM Form Entries checks for the client IP in order to save information about the user. The user can set an arbitrary 'HTTP_CLIENT_IP' value, and the value is stored inside the database.

RiteCMS 3.1.0 – Arbitrary File Overwrite (Authenticated)

RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write). Furthermore, an attacker might leverage the capability of arbitrary file overwrite to modify existing file such as /etc/passwd or /etc/shadow if the current PHP process user is run as root.

Recent Exploits: