August 16, 2024Hotel Booking System 1.0 Shell Upload

Hotel Booking System version 1.0 suffers from a remote shell upload vulnerability.

August 16, 2024Home Owners Collection Management System 1.0 Insecure Settings

Home Owners Collection Management System version 1.0 suffers from an ignored default credential vulnerability.

August 16, 2024Giftora 1.0 Cross Site Scripting

Giftora version 1.0 suffers from a cross site scripting vulnerability.

August 16, 2024Bhojon Restaurant Management System 3.0 Insecure Direct Object Reference

Bhojon Restaurant Management System version 3.0 suffers from an insecure direct object reference vulnerability.

August 15, 2024LG Simple Editor 3.21.0 Command Injection

LG Simple Editor versions 3.21.0 and below suffer from an unauthenticated command injection vulnerability. The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of NT A

August 15, 2024OpenMetadata 1.2.3 Authentication Bypass / SpEL Injection

This Metasploit module exploits OpenMetadata versions 1.2.3 and below by chaining an API authentication bypass using JWT tokens along with a SpEL injection vulnerability to achieve arbitrary command execution.

August 15, 2024Apache HugeGraph Gremlin Remote Code Execution

This Metasploit module exploits CVE-2024-27348, a remote code execution vulnerability that exists in Apache HugeGraph Server in versions before 1.3.0. An attacker can bypass the sandbox restrictions and achieve remote code execution through Gremlin, resul

August 15, 2024Feberr 13.4 Insecure Settings

Feberr version 13.4 suffers from an ignored default credential vulnerability.

August 15, 2024Farmacia Gama 1.0 Cross Site Scripting

Farmacia Gama version 1.0 suffers from a cross site scripting vulnerability.

August 15, 2024Ecommerce 1.15 Insecure Settings

Ecommerce version 1.15 suffers from an ignored default credential vulnerability.

Archives
Categories
  • All Exploits 4095
  • Remote Code Execution
  • SQL Injection
  • Command Injection
  • Local File Inclusion
  • Cross Site Scripting
  • Privilege Escalation
  • Denial Of Service
  • Authentication Bypass
  • Buffer Overflow