header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dental Clinic Appointment Reservation System 1.0 – Authentication Bypass (SQLi)

Attackers can bypass the admin login page due to unsanitized user input and access internal contents. The vulnerable code is located in /admin/index.php, line 34, where the query is constructed without sanitizing the user input. The payload used is 'admin' or '1' = '1 -- -' which allows the attacker to bypass the authentication.

Chevereto 3.17.1 – Cross Site Scripting (Stored)

Chevereto 3.17.1 is vulnerable to Cross Site Scripting (Stored) vulnerability. An attacker can exploit this vulnerability by uploading an image and writing '><svg/onload=alert(1)> instead of the title. After uploading the image, the attacker can go to the picture address and execute malicious code.

Odoo 12.0.20190101 – ‘nssm.exe’ Unquoted Service Path

Odoo 12.0.20190101 is vulnerable to Unquoted Service Path vulnerability. This vulnerability can be exploited by malicious users to gain privileges. The vulnerability is due to the application not properly quoting the path of the service executable. A malicious user can exploit this vulnerability to gain elevated privileges.

Human Resource Information System 0.1 – ‘First Name’ Persistent Cross-Site Scripting (Authenticated)

The web application allows for an assistant to inject persistent Cross-Site-Scripting payload which will be executed in both assistant and Super Admin panel. An attacker can use this vulnerability to take over Super Admin account.

PHP Timeclock 1.04 – ‘Multiple’ Cross Site Scripting (XSS)

PHP Timeclock version 1.04 (and prior) suffers from multiple Cross-Site Scripting vulnerabilities. Unauthenticated Reflected XSS can be injected into the application by appending a termination /'> and payload directly to the end of the GET request URL. The vulnerable paths include (1) /login.php (2) /timeclock.php (3) /reports/audit.php and (4) /reports/timerpt.php. Unauthenticated Reflected XSS can also be injected into the application in POST requests to (1) /reports/audit.php (2) /reports/total_hours.php (3) /reports/timerpt.php via the from_date and to_date parameters.

PHP Timeclock 1.04 – Time and Boolean Based Blind SQL Injection

PHP Timeclock is vulnerable to both Boolean and Time Based SQL Injection on login.php via the login_userid parameter. This PoC shows how SQLmap can be used to exploit this vulnerability to dump database contents. Boolean Based Payload: user' RLIKE (SELECT (CASE WHEN (8535=8535) THEN 0x75736572 ELSE 0x28 END))-- QwMo&login_password=pass. Time Based Payload: user' AND (SELECT 4247 FROM (SELECT(SLEEP(5)))ztHm) AND 'WHmv'='WHmv&login_password=pass.

Recent Exploits: