header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cassandra Web 0.5.0 – Remote File Read

Cassandra Web is vulnerable to directory traversal due to the disabled Rack::Protection module. Apache Cassandra credentials are passed via the CLI in order for the server to auth to it and provide the web access, so they are also one thing that can be captured via the arbitrary file read.

Responsive FileManager 9.13.4 – ‘path’ Path Traversal

Responsive FileManager 9.13.4 is vulnerable to Path Traversal. An attacker can exploit this vulnerability to read arbitrary files from the server. This vulnerability is due to insufficient sanitization of user-supplied input in the 'path' parameter of the 'ajax_calls.php' script. An attacker can exploit this vulnerability by sending a crafted HTTP request containing directory traversal sequences (e.g., '../') to the vulnerable script. Successful exploitation of this vulnerability will allow an attacker to read arbitrary files from the server.

Baby Care System 1.0 – ‘Post title’ Stored XSS

Log in with a valid username and password. Navigate to the 'Post' tab on the left-hand side. Add the new post and then add the payload '<audio src/onerror=alert(document.cookie)' in 'Post title' parameter and click on save button. Post Saved successfully. Now, XSS will get stored and trigger every time and the attacker can steal authenticated users' cookies.

Online Movie Streaming 1.0 – Authentication Bypass

An authentication bypass vulnerability exists in Online Movie Streaming 1.0. An attacker can exploit this vulnerability by entering anything@mail.com as the username and ' or '1'='1'# as the password in the user-login.php page. This will allow the attacker to bypass the authentication and gain access to the application.

WordPress Plugin Stripe Payments 2.0.39 – ‘AcceptStripePayments-settings[currency_code]’ Stored XSS

A Stored Cross-site scripting (XSS) was discovered in wordpress plugins stripe-payments (Ver_2.0.39). Vulnerability parameters : 'AcceptStripePayments-settings[currency_code]' have Cross-Site Scripting.

Resumes Management and Job Application Website 1.0 – Authentication Bypass (Sql Injection)

An attacker can bypass authentication by entering ' or '1'='1'# as the username and any value as the password in the login page of the Resumes Management and Job Application Website 1.0.

Recent Exploits: