header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Draytek VigorAP 1000C – Persistent Cross-Site Scripting

A persistent input validation vulnerability has been discovered in the official Draytek VigorAP product series application. The vulnerability allows remote attackers to inject own malicious script codes with persistent attack vector to compromise browser to web-application requests from the application-side. The persistent input validation web vulnerability is located in the username input field of the RADIUS Setting - RADIUS Server Configuration module. Remote attackers with limited access are able to inject own malicious persistent script codes as username.

Car Park Management System 1.0 – Authentication Bypass

An authentication bypass vulnerability exists in Car Park Management System 1.0. By sending a specially crafted request, an attacker can bypass authentication and gain access to the application.

FlashGet 1.9.6 – Denial of Service (PoC)

A denial of service vulnerability exists in FlashGet 1.9.6. A remote attacker can send a specially crafted FTP request with a long string in the PWD command to cause a buffer overflow, resulting in a denial of service condition. The vulnerability is due to insufficient boundary checks when handling FTP requests. An attacker can send a specially crafted FTP request with a long string in the PWD command to trigger this vulnerability.

MPC Sharj 3.11.1 – Arbitrary File Download

MPC Sharj is a free open source script for creating sim card credit card's shop. The vulnerability exists in the download.php file, where the parameter 'id' is vulnerable to an arbitrary file download attack. An attacker can craft a malicious payload by converting the file to be read into base64, then reversing the base64 string, and finally passing it as a parameter to the download.php file.

YesWiki cercopitheque 2020.04.18.1 – ‘id’ SQL Injection

YesWiki cercopitheque 2020-04-18-1 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'BazaR' script. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script and execute arbitrary code on the underlying database.

Online Clothing Store 1.0 – ‘username’ SQL Injection

An unauthenticated attacker can inject malicious SQL code into the 'username' parameter of the login.php page of the Online Clothing Store 1.0 application. By sending a specially crafted request, an attacker can bypass authentication and gain access to the application.

Booked Scheduler 2.7.7 – Authenticated Directory Traversal

Booked Scheduler is vulnerable to an authenticated directory traversal vulnerability. This vulnerability allows an authenticated user to access files outside of the web root directory. The vulnerable parameter is $tn, which is located in the manage_email_templates.php file. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the server.

Recent Exploits: