header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Lot Reservation Management System Unauthenticated File Upload and Remote Code Execution

Lot Reservation Management System allows unauthenticated users to upload files, leading to remote code execution. This could potentially result in unauthorized access to the system and sensitive information.

R Radio Network FM Transmitter 1.07 system.cgi Password Disclosure

The R Radio FM Transmitter version 1.07 is vulnerable to an improper access control issue that allows unauthenticated users to access the system.cgi endpoint and reveal the plaintext password of the admin user, facilitating authentication bypass and unauthorized access to FM station setup.

GoAhead Web Server 2.5 – ‘goform/formTest’ Multiple HTML Injection Vulnerabilities

The GoAhead Web Server version 2.5 is vulnerable to multiple HTML injection flaws as it lacks proper input validation. Exploiting this vulnerability allows an attacker to execute malicious HTML code within the context of the affected site.

Online Shopping System Advanced SQL Injection Vulnerability

The Online Shopping System Advanced version 1.0 is vulnerable to SQL injection due to improper filtering of user-provided input in the 'cm' parameter. An attacker can inject malicious SQL statements through the 'cm' parameter, leading to unauthorized access to the database and exposure of sensitive information like user credentials.

101 News-1.0 Multiple SQL Injection

The 'searchtitle' parameter in 101 News-1.0 is vulnerable to SQL injection attacks. By injecting a SQL sub-query payload that calls MySQL's load_file function with a UNC file path referencing an external domain, an attacker can execute malicious SQL queries. The application interacts with the external domain, confirming the successful execution of the injected SQL query.

Wondercms 4.3.2 XSS to RCE

The exploit script allows an attacker to perform an XSS attack that leads to remote code execution on Wondercms version 4.3.2. By injecting a malicious script through a crafted link, the attacker can execute arbitrary commands on the server.

DataCube3 v1.0 – Unrestricted File Upload Remote Code Execution (RCE)

The DataCube3 version 1.0 allows attackers to perform remote code execution through an unrestricted file upload vulnerability. By exploiting this flaw, an attacker could upload malicious files to the server, leading to the execution of arbitrary code. This vulnerability has been assigned CVE-2024-25830 and CVE-2024-25832.

Recent Exploits: