header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MSI Ambient Link Driver 1.0.0.8 – Local Privilege Escalation

MSI Ambient Link Driver 1.0.0.8 contains a kernel stack based buffer overflow vulnerability which can be exploited by a local attacker to gain elevated privileges. The vulnerability exists in the MSIO64.sys driver, which fails to properly validate user-supplied input when handling IOCTL 0x222040. An attacker can send a specially crafted IOCTL request to the vulnerable driver, which can be used to overwrite a function pointer on the stack and gain arbitrary code execution in kernel mode.

Mida eFramework 2.8.9 – Remote Code Execution

Mida eFramework 2.8.9 is vulnerable to OS Command Injection RCE in PDC/pages/network.php, which allows an attacker to execute arbitrary commands on the vulnerable system. This vulnerability can be exploited by sending a maliciously crafted POST request to the vulnerable page. The exploit can be used to gain a reverse shell on the vulnerable system.

B-swiss 3 Digital Signage System 3.6.5 – Database Disclosure

The application is vulnerable to unauthenticated database download and information disclosure vulnerability. This can enable the attacker to disclose sensitive information resulting in authentication bypass, session hijacking and full system control.

Visitor Management System in PHP 1.0 – Persistent Cross-Site Scripting

The file myform.php does not perform input validation on the request paramters. An attacker can inject javascript payloads in the parameters to perform various attacks suchs as stealing of cookies,sensitive information etc.

Simple Online Food Ordering System 1.0 – ‘id’ SQL Injection (Unauthenticated)

A vulnerability exists in Simple Online Food Ordering System 1.0, where an unauthenticated user can inject malicious SQL code into the 'id' parameter of the 'view_prod.php' page, allowing them to access and modify data in the database. The vulnerable code is located in the 'view_prod.php' page, where the 'id' parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL code in the 'id' parameter.

Online Food Ordering System 1.0 – Remote Code Execution

A vulnerability exists in the Online Food Ordering System 1.0, which allows an attacker to execute arbitrary code on the target system. This is due to the lack of proper input validation in the 'save_menu' action of the 'ajax.php' script, which allows an attacker to upload a malicious PHP file to the 'images/menu' directory. This can be exploited to execute arbitrary code on the target system by sending a specially crafted HTTP request containing the malicious PHP file.

Flatpress Add Blog 1.0.3 – Persistent Cross-Site Scripting

Flatpress Add Blog 1.0.3 is vulnerable to persistent cross-site scripting. An attacker can inject malicious JavaScript code into the content parameter of the POST request to the admin.php page. This code will be executed when the page is loaded by an authenticated user.

Comodo Unified Threat Management Web Console 2.7.0 – Remote Code Execution

A vulnerability in Comodo Unified Threat Management (UTM) Web Console versions before 2.7.0 and 1.5.0 allows an unauthenticated attacker to execute arbitrary code on the system. This is due to the lack of authentication for the webshell/u endpoint, which allows an attacker to send a crafted request to execute arbitrary code on the system. The attacker can send a crafted request to the webshell/u endpoint to execute arbitrary code on the system.

B-swiss 3 Digital Signage System 3.6.5 – Remote Code Execution

The application suffers from an authenticated arbitrary PHP code execution vulnerability caused due to the improper verification of uploaded files in 'index.php' script thru the 'rec_poza' POST parameter. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file that will be stored in '/usr/users' directory. An attacker can use hard-coded credentials to authenticate and use the vulnerable image upload functionality to execute code on the server.

Mida eFramework 2.9.0 – Back Door Access

This script can be used to retrieve the code which gives you the possibility to change the password. How it works: 1) run the script 2) copy the output to the URL you want to access (i.e. http://192.168.1.60:8090/PDC/extreq.php?code=THE-CODE) 3) change the password 4) access as admin with the password

Recent Exploits: