header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

flatnux-2021-03.25 – Remote Code Execution (Authenticated)

A vulnerability in flatnux 2021-03.25 allows an authenticated user to execute arbitrary code by uploading a malicious file via the filemanager.php page. The vulnerability exists due to insufficient validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious code to the vulnerable application. Successful exploitation of this vulnerability could result in remote code execution.

ABUS Security Camera TVIP 20000-21150 – LFI, RCE and SSH Root Access

During a recent engagement, a network camera was discovered. Web fuzzing revealed a URL of /device containing output about running processes as well as a pretty complete listing of webcontent which inevitably arose our suspicion. More research revealed that files w/ known LFI and RCE issues were present, leading to either arbitrary file reads or remote code execution, both w/ root privileges and using known default credentials (either admin:admin or manufacture:erutcafunam). After closer filesystem inspection, RCE led to a remote root SSH shell.

Simple Food Ordering System v1.0 – Cross-Site Scripting (XSS)

The Reflected XSS found in order parameter of process_order.php page. Authenticated Reflected Cross-Site Scripting (XSS) is a serious vulnerability that can have a significant impact on the security of a web application and its users. The risk of Authenticated Reflected XSS is similar to that of Reflected XSS, but with the added danger that the attacker must first gain access to a valid user account in order to exploit the vulnerability. The main risk associated with Authenticated Reflected XSS is that it can allow an attacker to steal sensitive information or take control of a user's account on a web application. This can include login credentials, financial information, personal information, and more.

Music Gallery Site v1.0 – SQL Injection on page Master.php

The Music Gallery site does have public pages for music library. Whenever someone click on play button any music the popup will appear on the page and the URL of the page will be like this: php-music/classes/Master.php?f=get_music_details&id=*. The parameter 'id' is vulnerable to SQL Injection attack. An attacker can inject malicious SQL queries into the parameter and can gain access to the database.

Music Gallery Site v1.0 – SQL Injection on music_list.php

The Music Gallery site does have public pages for music library, on music list there is an SQL injection to filter out the music list with category basis. The attacker can use this vulnerability to bypass the security measures put in place by the application, allowing them to access or modify sensitive data, or even take control of the entire system.

Employee Task Management System v1.0 – SQL Injection on edit-task.php

The employee task management system supports two roles of users, one is admin, and another is a normal employee. On this page task_id parameter is vulnerable to SQL Injection Attack. An attacker can inject malicious SQL queries into the vulnerable parameter and can gain access to the database.

Employee Task Management System v1.0 – SQL Injection on (task-details.php?task_id=?)

The vulnerability exists in the task-details.php page, where the task_id parameter is vulnerable to SQL Injection attack. An attacker can inject malicious SQL code into the task_id parameter and execute it on the database, allowing them to access or modify sensitive data, or even take control of the entire system.

Recent Exploits: