header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Complaints Report Management System 1.0 – ‘username’ SQL Injection / Remote Code Execution

An attacker can exploit a SQL injection vulnerability in Complaints Report Management System 1.0 to gain access to the admin panel and execute arbitrary code on the server. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'username' parameter of the 'admin/ajax.php?action=save_settings' script. An attacker can send a specially crafted request with malicious SQL statements to the vulnerable script and execute arbitrary code on the server.

Multi Restaurant Table Reservation System 1.0 – ‘table_id’ Unauthenticated SQL Injection

The file view-chair-list.php does not perform input validation on the table_id parameter which allows unauthenticated SQL Injection. An attacker can send malicious input in the GET request to /dashboard/view-chair-list.php?table_id= to trigger the vulnerability.

Monitorr 1.7.6m – Authorization Bypass

Monitorr 1.7.6m allows creation of administrative accounts by abusing the installation URL. An attacker can exploit this vulnerability by sending a POST request to the register.php page with the user credentials. This will create an administrative account with the specified credentials.

Monitorr 1.7.6m – Remote Code Execution (Unauthenticated)

Monitorr 1.7.6m is vulnerable to remote code execution due to an unauthenticated upload.php file. An attacker can exploit this vulnerability by sending a maliciously crafted POST request to the upload.php file, which will allow them to execute arbitrary code on the server. This vulnerability was discovered by Lyhin's Lab and detailed in their blog post.

WordPress Plugin Simple File List 4.2.2 – Arbitrary File Upload

This exploit allows an attacker to upload a malicious file to the vulnerable Wordpress Plugin Simple File List 4.2.2. The attacker can then move the file to the wp-config.php file, which can lead to remote code execution.

Apache Flink 1.9.x – File Upload RCE (Unauthenticated)

A vulnerability in Apache Flink 1.9.x allows an unauthenticated attacker to upload a malicious JAR file and execute arbitrary code on the server. The vulnerability is due to the lack of authentication when uploading JAR files to the server. An attacker can exploit this vulnerability by sending a specially crafted request to the server to upload a malicious JAR file and execute arbitrary code on the server.

Simple College Website 1.0 – SQL Injection / Remote Code Execution

A vulnerability in Simple College Website 1.0 allows an attacker to execute arbitrary code on the target system by exploiting a SQL injection vulnerability in the admin login page and then uploading a malicious file using a multipart form.

Online Job Portal 1.0 – ‘userid’ SQL Injection

The vulnerability exists due to improper validation of user-supplied input in the 'UserId' parameter of the 'EditUser.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to disclose sensitive information, modify data, compromise the integrity of data, and, in certain circumstances, to execute arbitrary code on the system.

CSE Bookstore 1.0 – ‘quantity’ Persistent Cross-site Scripting

CSE Bookstore is vulnerable to a Persistent Cross-site scripting on Checkout.php and cartp.php, Where an user can able to add quantity as an XSS Payload and once added each time when we click on MyCart option it triggers as stored one.

Recent Exploits: