header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Umbraco CMS – Remote Code Execution by authenticated administrators

A vulnerability in Umbraco CMS allows authenticated administrators to execute arbitrary code on the server. This is achieved by sending a specially crafted payload to the vulnerable web page. The payload is an XSLT stylesheet containing a C# script that executes the calc.exe program. The vulnerable web page is located at /umbraco/developer/Xslt/xsltVisualize.aspx.

Job Portal 1.0 – SQL Injection

Job Portal 1.0 is vulnerable to SQL Injection. An attacker can send a malicious SQL query to the web application which can be used to extract sensitive information from the database. This can be exploited by sending a specially crafted HTTP POST request to the vulnerable parameter job_id.

thinkphp 5.X RCE

ThinkPHP is an open source PHP framework. A remote code execution vulnerability exists in ThinkPHP 5.X versions due to improper input validation. An attacker can exploit this vulnerability by sending a crafted payload to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

HealthNode Hospital Management System 1.0 – SQL Injection

HealthNode Hospital Management System 1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'username' parameter of the 'email.php' script. An attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in the back-end database.

Craigs CMS 1.0.2 – SQL Injection

Craigs CMS 1.0.2 is vulnerable to SQL Injection. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate the data in the database, compromise the integrity of the data, or disclose sensitive data from the database.

Recent Exploits: