header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Vehicle Service Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

Vehicle Service Management System 1.0 is vulnerable to Remote Code Execution (RCE) due to an authentication bypass vulnerability. An attacker can exploit this vulnerability by sending a malicious request to the server with a crafted payload. This will allow the attacker to execute arbitrary code on the server.

Phpwcms 1.9.30 – Arbitrary File Upload

Phpwcms 1.9.30 is vulnerable to an arbitrary file upload vulnerability. An attacker can upload a malicious SVG file containing a malicious JavaScript payload, which can be used to execute arbitrary code on the server. The attacker needs to login to the system and create a payload with SVG extension. Then, the attacker needs to go to the file upload page and upload the malicious SVG file. After uploading the payload, the attacker can call it from the link provided.

Drupal Module MiniorangeSAML 8.x-2.22 – Privilege escalation via XML Signature Wrapping

The MiniorangeSAML Drupal Plugin v. 8.x-2.22 is vulnerable to XML Signature Wrapping Attacks that could allows an attacker to perform privilege escalation attacks. In order to exploit the vulnerability, the plugin must be configured with the 'Either SAML reponse or SAML assertion must be signed' options enabled and an empty 'x509 certificate'. An attacker can register a normal user on the website, perform a login, intercept the request with Burp Suite and decode the SAMLResponse parameter, inject an additional <Saml:Assertion> object before the original one and send the modified request. The user will be logged in as an administrator.

Exam Form Submission System 1.0 – SQL Injection Authentication Bypass

An attacker can bypass authentication by sending a specially crafted HTTP POST request to the application. The request contains a username and password parameter with a value of ' OR 1 -- -. This will cause the application to bypass authentication and allow the attacker to gain access to the application.

Pharmacy Point of Sale System 1.0 – ‘Multiple’ SQL Injection (SQLi)

Pharmacy Point of Sale System v1.0 is vulnerable to multiple SQL injection attacks. An attacker can exploit this vulnerability by sending malicious requests to the application. For example, sending a request to view_product.php with an id parameter set to -1' will result in a SQL injection attack. Other vulnerable parameters include date_from, date_to, page, expiry_date, product_id, quantity, supplier_id, view_only, and id. An attacker can also exploit the save_stock action in Actions.php by sending a malicious POST request.

Cmsimple 5.4 – Remote Code Execution (RCE) (Authenticated)

A vulnerability in Cmsimple 5.4 allows an authenticated user to execute arbitrary code on the target system. This is achieved by sending a crafted POST request to the target system with a malicious payload. The payload is then executed on the target system.

Cyber Cafe Management System Project (CCMS) 1.0 – SQL Injection Authentication Bypass

An attacker can bypass the authentication of Cyber Cafe Management System (CCMS) 1.0 by sending a specially crafted HTTP POST request with a username of ' OR 1 -- - and a password of ccms. This will allow the attacker to gain access to the admin panel without valid credentials.

Pet Shop Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

Pet Shop Management System 1.0 is vulnerable to Remote Code Execution (RCE) due to improper validation of user-supplied input. An attacker can exploit this vulnerability by uploading a malicious file to the server via the 'images' parameter in the 'add_petmanagement.php' controller. This can be used to execute arbitrary code on the server.

OpenSIS 8.0 – ‘cp_id_miss_attn’ Reflected Cross-Site Scripting (XSS)

OpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter. An attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable application. This will allow the attacker to execute arbitrary HTML and JavaScript code in the context of the affected application.

Recent Exploits: