header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Spotweb 1.4.9 – ‘search’ SQL Injection

An SQL injection vulnerability exists in Spotweb 1.4.9. A remote attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. Successful exploitation of this vulnerability could allow an attacker to gain access to sensitive information from the database.

Queue Management System 4.0.0 – “Add User” Stored XSS

Queue Management System 4.0.0 is vulnerable to stored XSS. An attacker can exploit this vulnerability by inserting malicious payloads in the "First Name", "Last Name" and "Email" fields of the "Add User" page. When an admin user visits the "User List" page, the malicious payload will be executed, resulting in the execution of arbitrary JavaScript code in the context of the admin user's browser.

Xeroneit Library Management System 3.1 – ‘Add Book Category’ Stored XSS

A stored XSS vulnerability exists in Xeroneit Library Management System 3.1, which allows an attacker to inject malicious JavaScript code into the 'Category Name' field when adding a new book category. This malicious code is then stored in the application and executed when the page is loaded by an authenticated user.

Smart Hospital 3.1 – “Add Patient” Stored XSS

Smart Hospital 3.1 is vulnerable to Stored XSS. An attacker can exploit this vulnerability by logging in to the application with Super Admin credentials, clicking on "OPD-Out Patient" and then clicking on "Add Patient" then selecting "Add Patient" Again. The attacker can then insert payload - "><svg/onmouseover=alert(1)> , in Name , Guardian Name , Email , Address , Remarks and Any Known Allergies and Save it. When the user moves around the patient profile details, an alert box will be shown.

WordPress Duplicator File Read Vulnerability

This module exploits an unauthenticated directory traversal vulnerability in WordPress plugin 'Duplicator' plugin version 1.3.24-1.3.26, allowing arbitrary file read with the web server privileges. This vulnerability was being actively exploited when it was discovered.

Alumni Management System 1.0 – Unrestricted File Upload To RCE

An Unrestricted File Upload vulnerability in Alumni Management System 1.0 allows an attacker to upload a malicious PHP webshell to the server. By visiting the ‘/admin/assets/uploads/’ directory, the attacker can execute arbitrary code on the server.

Point of Sale System 1.0 – Authentication Bypass

Easy authentication bypass vulnerability on the application allows an attacker to log in as Administrator. Step 1: On the login page, simply use { ' or 0=0 # } as username. Step 2: On the login page, use same query{ ' or 0=0 # } as password. All set you should be logged in as Administrator.

Nxlog Community Edition 2.10.2150 – DoS (Poc)

This exploit is a proof of concept for a denial of service vulnerability in Nxlog Community Edition 2.10.2150. The exploit sends a malicious syslog packet to the NXLOG server, which causes the service to crash. The malicious packet contains a priority of 30 and a message of 'Silence is golden'. The exploit can be used to target both Unix and Windows systems.

Recent Exploits: