header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GOautodial 4.0 – Authenticated Shell Upload

GOautodial 4.0 is vulnerable to an authenticated shell upload vulnerability. An attacker can log in as an agent, write a new message to user goadmin with a random subject and text, attach a webshell to the message, and access the shell at https://www.foo.com/uploads/year/month/shellname.php. This allows the attacker to gain privileged access to the system.

School Faculty Scheduling System 1.0 – Authentication Bypass

An authentication bypass vulnerability exists in School Faculty Scheduling System 1.0. By sending a malicious request with payload jyot' or 1=1# in user and password field, an attacker can bypass authentication and gain access to the admin panel.

School Faculty Scheduling System 1.0 – Stored Cross Site Scripting

A stored cross-site scripting vulnerability exists in the School Faculty Scheduling System 1.0, which allows an attacker to inject malicious JavaScript code into the application. This code is then executed in the browser of any user who visits the Course List section. The malicious code is injected via the Course and Description fields when creating a new course.

WordPress Rest Google Maps Plugin SQL Injection

A SQL injection vulnerability was discovered in the WordPress Rest Google Maps Plugin. An attacker can exploit this vulnerability to execute arbitrary SQL commands on the vulnerable system. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'rest_route' parameter of the 'index.php' script. An attacker can send a specially crafted HTTP request containing malicious SQL commands to the vulnerable script and execute arbitrary SQL commands on the underlying database.

Apache Struts 2 – DefaultActionMapper Prefixes OGNL Code Execution

The Struts 2 DefaultActionMapper supports a method for short-circuit navigation state changes by prefixing parameters with 'action:' or 'redirect:', followed by a desired navigational target expression. This mechanism was intended to help with attaching navigational information to buttons within forms.

Mobile Shop System v1.0 – SQLi lead to authentication bypass

A SQL injection vulnerability exists in Mobile Shop System v1.0, which allows an attacker to bypass authentication by injecting a malicious SQL payload (test' or 1=1 -- -) in the email field and any password in the password field. This can be exploited by sending a malicious HTTP POST request to the vulnerable application.

Recent Exploits: