header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Textpattern CMS 4.8.4 – ‘Comments’ Persistent Cross-Site Scripting (XSS)

Textpattern CMS version 4.8.4 is vulnerable to a persistent cross-site scripting (XSS) vulnerability. An attacker can inject malicious JavaScript code into the URL field of the 'Comments' page in the Textpattern CMS admin panel. When a user visits the page, the malicious code will be executed in the user's browser.

Online Ordering System 1.0 – Arbitrary File Upload to Remote Code Execution

An attacker can upload a malicious file to the web server by exploiting the arbitrary file upload vulnerability in the Online Ordering System 1.0. This vulnerability can be exploited by an attacker to execute arbitrary code on the web server.

Local Services Search Engine Management System (LSSMES) 1.0 – Blind & Error based SQL injection (Authenticated)

An authenticated blind and error based SQL injection vulnerability exists in the Local Services Search Engine Management System (LSSMES) version 1.0. An attacker can exploit this vulnerability by adding a double quote (") in the URL after the editid parameter. This can be exploited to gain access to the database and potentially execute arbitrary code.

Local Services Search Engine Management System (LSSMES) 1.0 – ‘name’ Persistent Cross-Site Scripting (XSS)

A persistent cross-site scripting (XSS) vulnerability exists in Local Services Search Engine Management System (LSSMES) 1.0, which allows an attacker to inject malicious JavaScript code into the application. An attacker can exploit this vulnerability by sending a specially crafted request to the application. The malicious code will be executed in the browser of the victim when the vulnerable page is accessed. This can be used to steal session cookies, hijack user accounts, and perform other malicious activities.

Web Based Quiz System 1.0 – ‘name’ Persistent/Stored Cross-Site Scripting

Stored/persistent XSS has been discovered in the Web Based Quiz System created by sourcecodester/janobe in registration form in name parameter affected from this vulnerability. payload: <script>alert(document.cookie)</script>

Tiny Tiny RSS – Remote Code Execution

A vulnerability in Tiny Tiny RSS before 2020-09-16 allows remote attackers to execute arbitrary code by leveraging the ability to inject arbitrary data into a malicious RSS feed. This is due to the lack of proper input validation in the 'config.php' file. An attacker can craft a malicious RSS feed containing a specially crafted link which can be used to execute arbitrary code on the vulnerable system.

Web Based Quiz System 1.0 – ‘MCQ options’ Persistent/Stored Cross-Site Scripting

Stored/persistent XSS has been discovered in the Web Based Quiz System created by sourcecodester/janobe in adding questions in options parameter affected from this vulnerability. payload: </script><script >alert(document.cookie)</script>

Covid-19 Contact Tracing System 1.0 – Remote Code Execution (Unauthenticated)

The web application allows for an unauthenticated file upload which can result in a Remote Code Execution. A python script is provided to upload a reverse shell php file and trigger it by requesting the login page.

Recent Exploits: