header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Rail Pass Management System – ‘searchdata’ Time-Based SQL Injection

The Rail Pass Management System's searchdata parameter in the search function is vulnerable to a time-based SQL injection attack. By sending a crafted payload, an attacker can cause the response time to increase significantly, indicating a successful injection.

Buffer Overflow in TP-Link TL-WR740N Router

A buffer overflow vulnerability exists in TP-Link TL-WR740N router, allowing an attacker to crash the web server by sending a specially crafted request. Rebooting the router is necessary to restore the web server functionality.

Electrolink FM/DAB/TV Transmitter Unauthenticated Remote DoS

Electrolink FM/DAB/TV Transmitters with web version 01.09, 01.08, and 01.07, display version 1.4 and 1.2, and control unit version 01.06, 01.04, and 01.03 are vulnerable to an unauthenticated remote Denial of Service (DoS) attack. This could allow an attacker to disrupt the broadcasting services, leading to a loss of service availability.

Advanced Page Visit Counter 1.0 – Admin+ Stored Cross-Site Scripting (XSS) (Authenticated)

The Advanced Page Visit Counter plugin for WordPress, up to version 8.0.5, is vulnerable to a Stored Cross-Site Scripting (XSS) attack. This vulnerability allows authenticated users, including administrators, to inject malicious scripts into the plugin's settings, potentially leading to the execution of arbitrary code in the context of other users' sessions.

Arbitrary Code Execution in Executables Created with perl2exe <= V30.10C

The perl2exe tool, up to version V30.10C, allows attackers to execute arbitrary code by manipulating the 0th argument of executables created with perl2exe. By crafting the argument, malicious actors can make the executable run another compiled executable, potentially leading to code execution and escaping restricted shell environments.

SQL Injection in Client Details System 1.0

Client Details System 1.0 is vulnerable to SQL Injection through the 'uemail' parameter in the '/clientdetails/' endpoint. An attacker can exploit this vulnerability to compromise the application, access or manipulate data, or leverage other vulnerabilities in the database.

Curfew e-Pass Management System 1.0 – FromDate SQL Injection

The Curfew e-Pass Management System 1.0 is vulnerable to SQL Injection in the 'FromDate' parameter. By manipulating the 'FromDate' parameter, an attacker can execute arbitrary SQL queries, potentially leading to unauthorized access to the database. This vulnerability has been tested on Windows 10/Wamp.

Recent Exploits: