Ahmet Ümit BAYRAM

106 exploits Active since Jun 2019
CVE-2019-25498 EXPLOITDB HIGH text WORKING POC
Simple Job Script - SQL Injection
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. Attackers can send POST requests to the searched endpoint with malicious SQL payloads to bypass authentication and extract sensitive database information.
CVSS 8.2
CVE-2019-25494 EXPLOITDB HIGH text WORKING POC
Homey BNB V4 - SQL Injection
Homey BNB V4 contains an SQL injection vulnerability in the administration panel login that allows unauthenticated attackers to bypass authentication by injecting SQL syntax into username and password fields. Attackers can submit SQL operators like '=' 'or' in both credentials to manipulate the authentication query and gain unauthorized access to the admin panel.
CVSS 8.2
CVE-2019-25493 EXPLOITDB HIGH text WORKING POC
Homey BNB V4 - SQL Injection
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'val' parameter. Attackers can send GET requests to the admin/getrecord.php endpoint with malicious 'val' values to extract sensitive database information.
CVSS 8.2
CVE-2019-25492 EXPLOITDB HIGH text WORKING POC
Homey BNB V4 - SQL Injection
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pt' parameter. Attackers can send GET requests to the admin/getcmsdata.php endpoint with malicious 'pt' values to extract sensitive database information.
CVSS 8.2
CVE-2019-25491 EXPLOITDB HIGH text WORKING POC
Homey BNB V4 - SQL Injection
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the catid parameter. Attackers can send GET requests to the admin/cms_getpagetitle.php endpoint with malicious catid values to extract sensitive database information.
CVSS 8.2
CVE-2019-25490 EXPLOITDB HIGH text WORKING POC
Homey BNB V4 - SQL Injection
Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'id' parameter. Attackers can send GET requests to the admin/edit.php endpoint with time-based SQL injection payloads to extract sensitive database information.
CVSS 8.2
CVE-2019-25489 EXPLOITDB HIGH text WORKING POC
Homey BNB V4 - SQL Injection
Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the hosting_id parameter. Attackers can send GET requests to the rooms/ajax_refresh_subtotal endpoint with malicious hosting_id values to extract sensitive database information or cause denial of service.
CVSS 8.2
CVE-2019-25462 EXPLOITDB HIGH text WORKING POC
Web Ofisi Rent a Car v3 - SQL Injection
Web Ofisi Rent a Car v3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'klima' parameter. Attackers can send GET requests to with malicious 'klima' values to extract sensitive database information or cause denial of service.
CVSS 8.2
CVE-2019-25461 EXPLOITDB HIGH text WORKING POC
Web Ofisi Platinum E-Ticaret v5 - SQL Injection
Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send POST requests to the ajax/productsFilterSearch endpoint with malicious 'q' values using time-based blind SQL injection techniques to extract sensitive database information.
CVSS 7.5
CVE-2019-25460 EXPLOITDB HIGH text WORKING POC
Web Ofisi Platinum E-Ticaret v5 - SQL Injection
Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' GET parameter. Attackers can send requests to the arama endpoint with malicious 'q' values using time-based SQL injection techniques to extract sensitive database information.
CVSS 7.5
CVE-2019-25459 EXPLOITDB CRITICAL text WORKING POC
Web Ofisi Emlak V2 - SQL Injection
Web Ofisi Emlak V2 contains multiple SQL injection vulnerabilities in the endpoint that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into parameters like emlak_durumu, emlak_tipi, il, ilce, kelime, and semt to extract sensitive database information or perform time-based blind SQL injection attacks.
CVSS 9.8
CVE-2019-25458 EXPLOITDB CRITICAL text WORKING POC
Web Ofisi Firma Rehberi v1 - SQL Injection
Web Ofisi Firma Rehberi v1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through GET parameters. Attackers can send requests to with malicious payloads in the 'il', 'kat', or 'kelime' parameters to extract sensitive database information or perform time-based blind SQL injection attacks.
CVSS 9.8
CVE-2019-25457 EXPLOITDB HIGH text WORKING POC
Web Ofisi Firma v13 - SQL Injection
Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]' values using time-based blind SQL injection payloads to extract sensitive database information.
CVSS 7.5
CVE-2019-25456 EXPLOITDB CRITICAL text WORKING POC
Web Ofisi Emlak v2 - SQL Injection
Web Ofisi Emlak v2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'ara' GET parameter. Attackers can send requests to with time-based SQL injection payloads to extract sensitive database information or cause denial of service.
CVSS 9.1
CVE-2019-25455 EXPLOITDB HIGH text WORKING POC
Web Ofisi E-Ticaret v3 - SQL Injection
Web Ofisi E-Ticaret v3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'a' parameter. Attackers can send GET requests to with malicious 'a' parameter values to extract sensitive database information.
CVSS 7.5
CVE-2024-58285 EXPLOITDB MEDIUM text WORKING POC
Chyrp - XSS
Chyrp 2.5.2 contains a stored cross-site scripting vulnerability that allows authenticated users to inject malicious scripts into post titles. Attackers can craft payloads in the title field that will execute when the post is viewed by other users, potentially stealing session cookies or performing client-side attacks.
CVSS 5.4
CVE-2024-58284 EXPLOITDB HIGH python WORKING POC
Popojicms - Code Injection
PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
CVSS 7.2
CVE-2024-58283 EXPLOITDB HIGH python WORKING POC
Wbce Cms - Unrestricted File Upload
WBCE CMS version 1.6.2 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the Elfinder file manager. Attackers can exploit the file upload functionality in the elfinder connector to upload a web shell and execute arbitrary system commands through a user-controlled parameter.
CVSS 8.8
CVE-2024-58282 EXPLOITDB HIGH python WORKING POC
S9Y Serendipity - Unrestricted File Upload
Serendipity 2.5.0 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload mechanism by creating a PHP shell with a command execution form that enables arbitrary system command execution on the web server.
CVSS 7.2
CVE-2024-58281 EXPLOITDB HIGH python WORKING POC
Dotclear - Unrestricted File Upload
Dotclear 2.29 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload process by crafting a PHP shell with a command execution form to gain system access through the uploaded file.
CVSS 8.8
CVE-2024-58280 EXPLOITDB HIGH text WORKING POC
CMSimple 5.15 - RCE
CMSimple 5.15 contains a remote command execution vulnerability that allows authenticated attackers to modify file extensions and upload malicious PHP files. Attackers can append ',php' to Extensions_userfiles and upload a shell script to the media directory to execute arbitrary code on the server.
CVSS 8.8
CVE-2024-58279 EXPLOITDB HIGH python WORKING POC
Apprain - Unrestricted File Upload
appRain CMF 4.0.5 contains an authenticated remote code execution vulnerability that allows administrative users to upload malicious PHP files through the filemanager upload endpoint. Attackers can leverage authenticated access to generate a web shell with command execution capabilities by uploading a crafted PHP file to the site's uploads directory.
CVSS 8.8
CVE-2024-14010 EXPLOITDB CRITICAL WRITEUP
Typora 1.7.4 - Command Injection
Typora 1.7.4 contains a command injection vulnerability in the PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the 'run command' input field during PDF export to achieve remote code execution.
CVSS 9.8
CVE-2023-53945 EXPLOITDB HIGH python WORKING POC
BrainyCP 1.0 - Authenticated RCE
BrainyCP 1.0 contains an authenticated remote code execution vulnerability that allows logged-in users to inject arbitrary commands through the crontab configuration interface. Attackers can exploit the crontab endpoint by adding a malicious command that spawns a reverse shell to a specified IP and port.
CVSS 8.8
CVE-2023-53927 EXPLOITDB MEDIUM text WORKING POC
PHPJabbers Simple CMS 5.0 - XSS
PHPJabbers Simple CMS 5.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through section name parameters. Attackers can create sections with embedded JavaScript payloads that will execute when administrators view the sections, potentially enabling client-side code execution.
CVSS 5.4