header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WyreStorm Apollo VX20 Incorrect Access Control Credentials Disclosure

An issue in WyreStorm Apollo VX20 devices before version 1.3.58 allows remote attackers to access cleartext credentials for the SoftAP Router configuration using an HTTP GET request, leading to unauthorized disclosure of sensitive information.

Bank Locker Management System – SQL Injection

A critical SQL Injection vulnerability was found in the Bank Locker Management System application, allowing an attacker to bypass authentication and gain unauthorized access to the system. By injecting 'admin' or '1'='1-- -' in the login and password fields, an attacker can access the application with administrative privileges.

Human Resource Management System – SQL Injection

The Human Resource Management System version 1.0 is vulnerable to SQL Injection through the 'employeeid' parameter. By using crafted payloads like 'employeeid=2' AND 9667=9667-- NFMg', an attacker can manipulate the SQL queries to extract sensitive information from the database. Successful exploitation allows unauthorized access to the database.

metabase 0.46.6 – Pre-Auth Remote Code Execution

The exploit allows an attacker to remotely execute code on the vulnerable server without authentication. This vulnerability has been assigned CVE-2023-38646. An attacker can send a malicious GET request to the '/exploitable' path, leading to the execution of arbitrary code.

VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) Remote Denial Of Service

The VIMESA VHF/FM Transmitter Blue Plus 9.7.1 is vulnerable to a Denial of Service (DoS) attack. By sending an unauthorized HTTP GET request to the unprotected endpoint 'doreboot', an unauthenticated attacker can restart the transmitter operations, causing a denial of service.

Blood Bank v1.0 SQL Injection Vulnerability

The vulnerability exists in Blood Bank v1.0 due to insufficient input validation on 'hemail' and 'hpassword' parameters. This allows attackers to execute SQL injection attacks, bypass authentication, and unauthorized access the database. The affected file is /hospitalLogin.php.

Zyxel Firmware Multiple Input Validation Vulnerability

The exploit targets Zyxel USG/ZyWALL series firmware versions 4.09 through 4.71, USG FLEX series firmware versions 4.50 through 5.21, and several other firmware versions. An authenticated attacker could exploit the improper input validation flaws in some CLI commands to cause a buffer overflow or system crash with a crafted payload.

Recent Exploits: