header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Student Enrollment System 1.0 – Cross-Site Request Forgery (Add Student)

This product is unprotected against CSRF vulnerabilities. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. An attacker can exploit this vulnerability by crafting a malicious HTML page that contains a form with malicious input fields and submit it to the vulnerable application. This can result in unintended actions being performed on behalf of the user.

Responsive Online Blog 1.0 – ‘id’ SQL Injection

The vulnerable file is category.php, which contains a parameter 'id' that is used in an SQL query without any changes. An attacker can use sqlmap to exploit the vulnerability by passing the URL 'http://localhost/resblog/category.php?id=1' with the --dbs --batch option, or by passing a single quote in the URL 'http://TARGET/resblog/category.php?id=1' which will cause an SQL error.

Odoo 12.0 – Local File Inclusion

Odoo 12.0 is vulnerable to Local File Inclusion (LFI) attacks. An attacker can exploit this vulnerability by sending a crafted HTTP request to the target server. The attacker can use the 'base_import/static/c:/windows/win.ini', 'web/static/c:/windows/win.ini' and 'base/static/c:/windows/win.ini' requests to get some information from the target.

Student Enrollment 1.0 – Unauthenticated Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a vulnerable system. The exploit is triggered by sending a specially crafted HTTP POST request to the register.php page of the Student Enrollment 1.0 application. The request contains a malicious command in the 'cmd' parameter, which is then executed on the vulnerable system.

Recent Exploits: