header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Windows PowerShell Single Quote Code Execution and Event Log Bypass Vulnerability

The vulnerability in Microsoft Windows PowerShell allows for code execution by bypassing single quote restrictions. By using a combination of semicolon and ampersand characters, a specially crafted filename can trigger arbitrary code execution and evade PS event logging. This can lead to unauthorized file execution and potential security breaches.

GYM Management System – Cross Site Scripting (Stored)

The GYM Management System version 1.0 is vulnerable to stored cross-site scripting (XSS) due to insufficient validation of user-supplied data. An attacker can inject a malicious payload in the 'lname' field, leading to the execution of arbitrary JavaScript code in the context of the victim's browser. This can result in session hijacking, sensitive information theft, or other malicious actions. The vulnerability was detected by Alperen Yozgat.

DS Wireless Communication Remote Code Execution

The exploit allows injection of arbitrary code into a client's game through a crafted payload. The code author holds no liability for any damages caused by the usage of this exploit. By exploiting this vulnerability, an attacker can execute remote code on the target system.

Clinic’s Patient Management System 1.0 – Unauthenticated Remote Code Execution

Unauthenticated users can exploit the Clinic's Patient Management System version 1.0 by uploading a malicious PHP file in place of a profile picture via the /pms/users.php address. This allows attackers to execute arbitrary commands on the server without requiring any authentication.

SureMDM On-premise CAPTCHA Bypass User Enumeration

The SureMDM On-premise version 6.31 and below allows an attacker to bypass CAPTCHA and enumerate users. By sending requests to the /ForgotPassword.aspx/ForgetPasswordRequest endpoint with a User ID, an attacker can check if the User ID exists without being blocked by the CAPTCHA mechanism. This vulnerability has been assigned the CVE-2023-3897.

SuperStoreFinder – Multiple Vulnerabilities

Super Store Finder is a PHP script with a vulnerability that allows unauthenticated SQL Injection attacks. By injecting SQL commands into the USERNAME parameter in the index.php file, attackers can perform boolean-based blind, error-based, or time-based blind SQL injection.

Lot Reservation Management System Unauthenticated File Disclosure Vulnerability

The Lot Reservation Management System is a PHP/MySQLi project designed to assist in managing property reservations. The system allows clients to view property information and make reservations. However, it is vulnerable to an unauthenticated file disclosure issue.

Recent Exploits: