header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Online Shopping System Advanced SQL Injection Vulnerability

The Online Shopping System Advanced version 1.0 is vulnerable to SQL injection due to improper filtering of user-provided input in the 'cm' parameter. An attacker can inject malicious SQL statements through the 'cm' parameter, leading to unauthorized access to the database and exposure of sensitive information like user credentials.

101 News-1.0 Multiple SQL Injection

The 'searchtitle' parameter in 101 News-1.0 is vulnerable to SQL injection attacks. By injecting a SQL sub-query payload that calls MySQL's load_file function with a UNC file path referencing an external domain, an attacker can execute malicious SQL queries. The application interacts with the external domain, confirming the successful execution of the injected SQL query.

Wondercms 4.3.2 XSS to RCE

The exploit script allows an attacker to perform an XSS attack that leads to remote code execution on Wondercms version 4.3.2. By injecting a malicious script through a crafted link, the attacker can execute arbitrary commands on the server.

DataCube3 v1.0 – Unrestricted File Upload Remote Code Execution (RCE)

The DataCube3 version 1.0 allows attackers to perform remote code execution through an unrestricted file upload vulnerability. By exploiting this flaw, an attacker could upload malicious files to the server, leading to the execution of arbitrary code. This vulnerability has been assigned CVE-2024-25830 and CVE-2024-25832.

GL.iNet <= 3.216 Remote Code Execution via OpenVPN Client

The GL.iNet <= 3.216 allows remote code execution via the OpenVPN client. An attacker can exploit this vulnerability by adding a malicious configuration file and client to the OpenVPN, which can lead to unauthorized access and potential compromise of the device. This vulnerability has been assigned CVE-2023-46456.

Atlassian Confluence Data Center and Server Authentication Bypass via Broken Access Control

This exploit leverages a broken access control vulnerability in Atlassian Confluence servers, enabling an attacker to bypass authentication. By sending a specially crafted request, an unauthorized admin account can be created on the targeted Atlassian server.

Recent Exploits: