header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cisco UCS Manager 2.2(1d) – Remote Command Execution

An unspecified CGI script in Cisco FX-OS before 1.1.2 on Firepower 9000 devices and Cisco Unified Computing System (UCS) Manager before 2.2(4b), 2.2(5) before 2.2(5a), and 3.0 before 3.0(2e) allows remote attackers to execute arbitrary shell commands via a crafted HTTP request, aka Bug ID CSCur90888.

Netsia SEBA+ <= 0.16.1 Authentication Bypass and Add Root User

This module exploits an authentication bypass in Netsia SEBA+, triggered by add new root/admin user. HTTP requests made to the 'Active Sessions' section which can be accessed by root/admin user, can be performed without the need for any session(cookie) information. Therefore, the session cookie informations of the active users in the application can be read from the response content. A new authorized user can be created with the obtained cookie.

E-Learning System 1.0 – Authentication Bypass & RCE

E-Learning System 1.0 is vulnerable to authentication bypass and remote code execution. An attacker can bypass authentication by using SQL injection and can execute arbitrary code by using the vulnerable add_post.php page.

Alumni Management System 1.0 – “Last Name field in Registration page” Stored XSS

Go to sign up page. In the "Last Name" field, use the following XSS payload "><img src=xx onerror=alert(document.cookie)> as the name and click on save. This should trigger the Stored XSS payload in admin panel users tab, once the admin login into the application to verify the registered users email address. The attacker steals the admin session cookie.

EyesOfNetwork 5.3 – File Upload Remote Code Execution

EyesOfNetwork 5.3 is vulnerable to a remote code execution vulnerability due to an arbitrary file upload. An attacker can exploit this vulnerability by uploading a malicious file to the server and then executing it. This can be done by using the curl command to upload the file and then using the curl command to execute it. The attacker can then start a listener on their machine to receive the output of the malicious file.

Online Hotel Reservation System 1.0 – ‘person’ time-based SQL Injection

The 'person' parameter is vulnerable to time-based SQL Injection. Using Burp Suite, send the following POST request: POST /marimar/index.php?p=booking HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; rv:11.0) like Gecko Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: de,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 71 Origin: http://localhost Connection: close Referer: http://localhost/marimar/index.php?p=booking Cookie: PHPSESSID=cf40af0022f401c8cfd0be17fc00a6cc Upgrade-Insecure-Requests: 1 arrival=01%2F19%2F2021&departure=01%2F11%2F2021&person=(select*from(select(sleep(10)))a)&accomodation=0

Online Hotel Reservation System 1.0 – ‘id’ Time-based SQL Injection

Vulnerable to SQL Injection. The 'id' parameter at http://localhost/marimar/admin/mod_room/index.php?view=edit&id=11 is vulnerable to time-based SQL injection. Payload: (select*from(select(sleep(10)))a) Proof of Concept: http://localhost/marimar/admin/mod_room/index.php?view=edit&id=(select*from(select(sleep(10)))a)

Online Hotel Reservation System 1.0 – Stored Cross-site Scripting

The room 'description' parameter is vulnerable to stored Cross-site Scripting. Login with administrator credentials at http://localhost/admin with admin:admin and click on 'Rooms' tab. Edit 'description' parameter with 1<script>alert('document.cookie')</script> and any user at http://localhost/marimar/index.php will get the XSS pop-up warning with their cookie values.

Recent Exploits: