header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Budget and Expense Tracker System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

Budget and Expense Tracker System 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously crafted PHP file that bypasses the image upload filters.

Church Management System 1.0 – Remote Code Execution (RCE) (Unauthenticated)

Church Management System (CMS-Website) 1.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously crafted PHP file that bypasses the image upload filters.

Online Food Ordering System 2.0 – Remote Code Execution (RCE) (Unauthenticated)

Online Food Ordering System 2.0 suffers from an Unauthenticated File Upload Vulnerability allowing Remote Attackers to gain Remote Code Execution (RCE) on the Hosting Webserver via uploading a maliciously crafted PHP file that bypasses the image upload filters.

WordPress 5.7 – ‘Media Library’ XML External Entity Injection (XXE) (Authenticated)

This exploit allows an authenticated user to inject malicious XML code into the WordPress Media Library, which can be used to perform SSRF attacks and read local files.

Simple Attendance System 1.0 – Authenticated bypass

Simple Attendance System, is prone to multiple vulnerabilities. Easy authentication bypass vulnerability on the application allowing the attacker to login. The attacker can use the wrong credentials and capture the request in burp and send it to repeater. Then, the attacker can replace the response with a successful login response and forward the request. This will allow the attacker to login as admin.

WordPress Plugin WooCommerce Booster Plugin 5.4.3 – Authentication Bypass

An authentication bypass vulnerability was patched in Booster for WooCommerce plugin. Attackers can exploit this vulnerability by visiting the target website's wp-json/wp/v2/users/ page, picking a user-ID, and then using the exploit_CVE-2021-34646.py script to generate multiple timestamps in order to avoid delay related timing errors. One of the generated links will allow the attacker to access the system.

Recent Exploits: