header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

School Event Attendance Monitoring System 1.0 – ‘Item Name’ Stored Cross-Site Scripting

This application is vulnerable to Stored XSS vulnerability. Whenever we will go to the page (http://localhost/attendance/sanction) where the script is injected, the stored script will be executed and the Javascript code (XSS) will be executed.

School File Management System 1.0 – ‘multiple’ Stored Cross-Site Scripting

School File Management System 1.0 is vulnerable to stored cross-site scripting. An attacker can inject malicious JavaScript code into the 'Firstname' and 'Lastname' fields of the 'Update Account' page. When a user visits the page, the malicious code will be executed, allowing the attacker to access the user's cookies.

PDFCOMPLETE Corporate Edition 4.1.45 – ‘pdfcDispatcher’ Unquoted Service Path

The PDFCOMPLETE Corporate Edition 4.1.45 is vulnerable to an unquoted service path vulnerability. This vulnerability can be exploited by an attacker to gain elevated privileges on the system. The vulnerability exists due to the pdfcDispatcher service not being properly quoted. An attacker can exploit this vulnerability by creating a malicious executable with the same name as the service and placing it in the same directory as the service executable. The malicious executable will then be executed with elevated privileges.

Online Marriage Registration System (OMRS) 1.0 – Remote code execution (3)

This exploit allows an attacker to execute arbitrary code on the vulnerable system without needing to upload any local file. The exploit works by registering a user with the Online Marriage Registration System (OMRS) 1.0, and then uploading a malicious PHP file. The attacker can then execute arbitrary code on the vulnerable system by sending a GET request to the malicious file.

Openlitespeed WebServer 1.7.8 – Command Injection (Authenticated) (2)

The 'path' parameter of OpenLiteSpeed (1.7.8) web server has command injection vulnerability that leads to escalate privilege. OpenLiteSpeed runs with user(nobody):group(nogroup) privilege. However, extUser and extGroup parameters could be used to join a group (GID) such as shadow, sudo, etc.

b2evolution 6.11.6 – ‘tab3’ Reflected XSS

Send the following URL http://HOST/evoadm.php?.ctrl=comments&filter=restore&tab3=123%22onmouseover=%22alert(document.domain)%22&blog=1&blog=1 to the logged in victim using any social engineering technique. When an unsuspecting user with high privileges opens this URL, XSS will be triggered which will execute the malicious javascript payload in users browser. The vulnerable parameter in this case is “tab3”.

b2evolution 6.11.6 – ‘redirect_to’ Open Redirect

An open redirect vulnerability exists in b2evolution 6.11.6. An attacker can craft a malicious link containing the 'redirect_to' parameter and send it to an unsuspecting user. When the user clicks on the link, they will be redirected to the attacker-controlled domain, which can be used to perform malicious phishing campaigns.

Node.JS – ‘node-serialize’ Remote Code Execution (2)

A vulnerability in the Node.js module 'node-serialize' allows remote attackers to execute arbitrary code. The vulnerability is due to the use of the 'eval' function to deserialize user-supplied data. An attacker can exploit this vulnerability by sending a malicious serialized object to the application. This can result in arbitrary code execution on the server.

b2evolution 6.11.6 – ‘plugin name’ Stored XSS

Login with an account having high privileges, navigate to System -> Plugins and select any plugin, change the plugin name and enter the following payload '><svg/onload=alert(123)> in the name parameter, payload gets stored in the database, the payload gets executed after the victim checks the plugin page, this vulnerability needs high privilege and can affect other users with similar privileges.

Adobe Connect 10 – Username Disclosure

By adding this (/system/help/support) to the end of the desired website address, you can view the username without any filter or obstacle. Sometimes even without a username and password. And by adding (/system/login) to the end of the desired website address, you can access the admin panel without any filters.

Recent Exploits: