header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Simple Payroll System 1.0 – SQLi Authentication Bypass

Simple Payroll System v1.0 Login page can be bypassed with a SQLi into the username parameter. An attacker can send a malicious payload into the username field as ' or 1=1-- without double-quotes and type anything into the password field. This will allow the attacker to bypass the authentication and gain access to the system as an administrator.

Loan Management System 1.0 – SQLi Authentication Bypass

Loan Management System Login page can be bypassed with a simple SQLi to the username parameter. Steps To Reproduce: 1 - Go to the login page http://localhost/audit_trail/login.php 2 - Enter the payload to username field as "admin' or '1'='1'#" without double-quotes and type anything to password field. 3 - Click on "Login" button and you are logged in as administrator.

Cmder Console Emulator 1.3.18 – ‘Cmder.exe’ Denial of Service (PoC)

Cmder is a software package created over absence of usable console emulator on Windows. It is based on ConEmu with major config overhaul, comes with a Monokai color scheme, amazing clink (further enhanced by clink-completions) and a custom prompt layout. A buffer overflow vulnerability exists in Cmder Console Emulator 1.3.18, which requires the execution of a .cmd file type and The created file enters the emulator, That will trigger the buffer overflow condition.

Online Employees Work From Home Attendance System 1.0 – SQLi Authentication Bypass

Online Employees Work From Home Attendance System/Logs in a Web App v1.0 Login page can be bypassed with a simple SQLi to the username parameter. The attacker can send a payload to the username field as 'admin' or '1'='1' without double-quotes and type anything to the password field. This will allow the attacker to bypass the authentication and gain access to the application.

Online Enrollment Management System 1.0 – Authentication Bypass

Admin panel authentication can be bypassed due to a SQL injection in the login form. A curl request can be used to exploit the vulnerability, with the user_email parameter set to 'admin' OR 1=1 LIMIT 1;--+- and the user_pass parameter set to 'junk'.

Simple Online College Entrance Exam System 1.0 – ‘Multiple’ SQL injection

The following PoCs will leak the admin username and password: Unauthenticated: http://127.0.0.1/entrance_exam/take_exam.php?id=%27+UNION+SELECT+1,username||%27;%27||password,3,4,5,6,7+FROM+admin_list; Admin: http://127.0.0.1/entrance_exam/admin/view_enrollee.php?id=1'+UNION+SELECT+1,2,3,4,5,6,password,username,9,10,11,12,13,14,15+FROM+admin_list;

Simple Online College Entrance Exam System 1.0 – Unauthenticated Admin Creation

An unauthenticated admin creation vulnerability exists in Simple Online College Entrance Exam System 1.0. An attacker can send a POST request to the Actions.php page with the parameters id, fullname, username, and type to create an admin user. A proof-of-concept (PoC) to create an admin user named exploitdb and password exploitdb is provided.

Maian-Cart 3.8 – Remote Code Execution (RCE) (Unauthenticated)

Maian-Cart 3.8 is vulnerable to Remote Code Execution (RCE) due to improper input validation. An unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable server. This will allow the attacker to execute arbitrary code on the vulnerable server.

django-unicorn 0.35.3 – Stored Cross-Site Scripting (XSS)

django-unicorn <= 0.35.3 suffers from a stored XSS vulnerability by improperly escaping data from AJAX requests. An attacker can exploit this vulnerability by entering an XSS payload in the todo form. This will allow the attacker to execute malicious JavaScript code in the victim's browser.

Recent Exploits: