header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpMyFAQ v3.1.12 – CSV Injection

A CSV injection vulnerability was discovered in phpMyFAQ v3.1.12. An attacker can exploit this vulnerability by logging in as a user and changing their name to 'calc|a!z|' and then having an admin export users as a CSV file. This will cause a CSV injection to occur on the admin's computer, which will open the calculator.

ChurchCRM 4.5.3 – Authenticated SQL Injection

ChurchCRM v4.5.3 and below was discovered to contain a SQL injection vulnerability via the Event parameter under the Event Attendance reports module. After Logging in, a GET request can be sent to the EventAttendance.php page with the Event parameter set to a malicious SQL query. The response will dump the usr_Username and usr_Password from the database.

Wondershare Filmora 12.2.9.2233 – Unquoted Service Path

Wondershare Filmora versions <= 12.2.9.2233 contains an unquoted service path which allows attackers to escalate privileges to the system level. An attacker can find the unquoted service path using the wmic command, get information about the service using the sc qc command, generate a reverse shell using msfvenom, upload the reverse shell to the unquoted service path, start a listener, and reboot the service/server to gain system level privileges.

Multi-Vendor Online Groceries Management System 1.0 – Remote Code Execution (RCE)

A vulnerability exists in the SystemSettings.php file of the Multi-Vendor Online Groceries Management System 1.0, which allows an attacker to inject malicious code into the welcome.html file. This code can then be included and executed in the home.php file, allowing the attacker to execute arbitrary commands on the system.

KodExplorer <= 4.49 - CSRF to Arbitrary File Upload

KodExplorer is vulnerable to CSRF to Arbitrary File Upload. An attacker can craft a malicious URL and send it to the victim. When the victim opens the URL, the attacker can upload a malicious file to the victim's system. This vulnerability affects KodExplorer versions <= 4.49.

OCS Inventory NG 2.3.0.0 – Unquoted Service Path

OCS Inventory NG Windows Agent versions below 2.3.1.0 contains an unquoted service path which allows attackers to escalate privileges to the system level. An attacker can find the unquoted service path using the wmic command, get informations about the service using the sc qc command, generate a reverse shell using the msfvenom command, upload the reverse shell to the vulnerable system, start a listener, and reboot the service/server to gain system level privileges.

Recent Exploits: