header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Grapixel New Media 2 – ‘pageref’ SQL Injection

Time-Based sql injection is called a data extraction event with request response times with the server when there is no other way for it to extract aggressive data. It should be determined by sql injection type. I discovered blind time-based sql injection. Because single quotes didn't break the page structure, so I tried to get results using waitfor delay instead.

Veterinary Clinic Management 00.02 – ‘editpetnum’ SQL Injection

An attacker can exploit a SQL injection vulnerability in Veterinary Clinic Management 00.02 by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, such as usernames and passwords, or even execute system level commands.

Delta Sql 1.8.2 – ‘id’ SQL Injection

Delta Sql 1.8.2 is vulnerable to 'id' SQL Injection. This vulnerability can be exploited by sending a maliciously crafted HTTP request to the vulnerable application. An attacker can inject arbitrary SQL commands into the 'id' parameter of the 'docs_manage.php' and 'list_project_modules.php' scripts. This can be used to bypass authentication, access, modify and delete data in the back-end database.

CVE-2018-14665 – a LPE exploit via http://X.org fits in a tweet

This exploit uses CVE-2018-14665 to overwrite files as root. It impacts Xorg 1.19.0 - 1.20.2 which ships setuid and vulnerable in default OpenBSD. The exploit uses a command line to cd to the /etc directory and then runs Xorg with a root user and password. After a few seconds, the Xorg process is killed and the user can then use the su command to gain root privileges.

Open STA Manager 2.3 – Arbitrary File Download

Open STA Manager 2.3 is vulnerable to arbitrary file download. Technicians, Agents, Customers users group can run sql codes. The vulnerable code is located in /[PATH]/modules/backup/actions.php, where the 'op' parameter is not properly sanitized before being used to read a file. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to download any file from the server.

MPS Box 0.1.8.0 – ‘uuid’ SQL Injection

An SQL injection vulnerability exists in MPS Box 0.1.8.0, which allows an attacker to inject malicious SQL queries via the 'uuid' parameter in the '/[PATH]/inc/popup.qrcode.inc.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

AjentiCP 1.2.23.13 – Cross-Site Scripting

Attacker can inject JavaScript codes without Ajenti privileges by this vulnerabillity. Normally an attacker cant intervene to Ajenti without Ajenti privileges. But with this vulnerability, if attacker can create a folder (may be by a web app vulnerability) he can run bad-purposed JavaScript codes on Ajenti user's browser, while the user using File Manager tool.

Recent Exploits: