header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online-Pizza-Ordering -1.0 – Remote Code Execution (RCE)

The malicious user can request an account from the administrator of this system. Then he can use this vulnerability to destroy or get access to all accounts of this system, even more, worst than ever. The malicious user can upload a very dangerous file on this server, and he can execute it via shell, this is because he can access the upload function from the administrator account.

Palo Alto Cortex XSOAR 6.5.0 – Stored Cross-Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations.

Medicine Tracker System v1.0 – Sql Injection

Medicine Tracker System v1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted request to the application. This can be done by using a tool such as Burp Suite to capture the request and then using sqlmap to exploit the vulnerability.

Online Appointment System V1.0 – Cross-Site Scripting (XSS)

An attacker can exploit this vulnerability by crafting a malicious payload and sending it to the vulnerable application. The payload is then executed in the browser of the victim when the vulnerable page is loaded. The payload can be sent to the vulnerable application in various ways such as via a malicious link, via a malicious file, or via a malicious parameter.

RSA NetWitness Platform 12.2 – Incorrect Access Control / Code Execution

Insecure Win32 memory objects in Endpoint Windows Agents in the NetWitness Platform through 12.x allow local and admin Windows user accounts to modify the endpoint agent service configuration: to either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.

ENTAB ERP 1.0 – Username PII leak

In the entab software in fapscampuscare.in, there is a login portal with a UserId field. An authenticated user would enter and get their name as well as other services. However, there should be a rate limit in place, which is not present. As a result, a hacker could bypass the system and obtain other usernames via broken access control. This enables a threat actor to obain the complete full name and user ID of the person.

Joomla! v4.2.8 – Unauthenticated information disclosure

Joomla! versions 4.0.0 to 4.2.7 are vulnerable to an unauthenticated information disclosure vulnerability. An attacker can exploit this vulnerability to gain access to sensitive information such as the version of Joomla! and the list of installed plugins.

Recent Exploits: