header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ultimate Project Manager CRM PRO 2.0.5 – SQLi Credentials Leakage

The SQLi injection does not allow UNION payloads. However, we can guess usernames and passwords fuzzing the database. A Python script was used to send payloads to the server and guess usernames and passwords. The lack of verification results in a warning message from Python. To get a clean output, all warnings were ignored.

Visitor Management System in PHP 1.0 – Authenticated SQL Injection

The file front.php does not perform input validation on the 'rid' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database.

WP Courses < 2.0.29 - Broken Access Controls leading to Courses Content Disclosure

WP Courses plugin < 2.0.29 does not protect the courses which could be accessed by unauthenticated users using the REST API (/wp-jon/) endpoints (for example /wp-json/wp/v2/lesson/{lesson_id}) This could result in attackers accessing paying content without authorization.

Loan Management System 1.0 – Multiple Cross Site Scripting (Stored)

Loan Management System 1.0 is vulnerable to multiple Cross Site Scripting (Stored) attacks. An attacker can inject malicious JavaScript code into the vulnerable pages by using the edit button in the right, action column. The malicious code is then stored in the database and is executed when the page is loaded. This can lead to the theft of sensitive information such as session cookies and other credentials.

Persistent XSS on Comtrend AR-5387un router

To exploit this vulnerability, once logged into the router, a WAN service must be created. Click on 'Advanced Setup', 'WAN Service'. 'Add button', 'Next'. Then insert the payload into the 'Enter Service Description' field. This was used for the PoC <script>alert('xss');</script>. Then click on 'Next' four times to go on through the steps and finally click on 'Apply/Save'. The result of the XSS will be displayed and triggered on the WAN services page.

Typesetter CMS 5.1 – Arbitrary Code Execution

The CMS Typesetter has functionality (web interface) where it is possible through an account with privileges to perform uploads. Through this functionality, it is possible to upload a .zip file that contains a malicious .php file. In the same functionality, there is also the possibility to extract the file through the same web interface, the attacker only needs to extract the .zip that was previously loaded and click on the malicious .php file to execute commands in the operating system.

PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, City

PHPGurukul hostel-management-system 2.1 is vulnerable to Cross-Site Scripting (XSS) attacks via the Guardian Name, Guardian Relation, Guardian Contact no, Address, and City fields. An attacker can inject malicious JavaScript code into these fields when booking a hostel, which will be triggered when the admin views the student's record. This can be used to steal user data or perform other malicious activities.

HiSilicon video encoders – unauthenticated RTSP buffer overflow (DoS)

HiSilicon video encoders are vulnerable to an unauthenticated buffer overflow in the RTSP protocol. This vulnerability can be exploited to cause a denial of service (DoS) attack. The exploit involves sending a specially crafted RTSP request with an excessively long CSeq header to the vulnerable device. This will cause the device to crash and become unresponsive.

HiSilicon video encoders – full admin access via backdoor password

A vulnerability in HiSilicon video encoders from URayTech, J-Tech Digital, and ProVideoInstruments allows an attacker to gain full administrative access to the device by using a backdoor password. The backdoor password can be retrieved by sending a request to the device's web server. Once the password is retrieved, the attacker can log into the admin interface with the user 'admin' and the retrieved password.

Recent Exploits: