Writeup Exploits

46,733 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-56216 WRITEUP HIGH
Phpgurukul Hospital Management System - SQL Injection
phpgurukul Hospital Management System 4.0 is vulnerable to SQL Injection in about-us.php via the pagetitle parameter.
CVSS 8.5
CVE-2025-57146 WRITEUP HIGH
Phpgurukul Complaint Management System - SQL Injection
phpgurukul Complaint Management System in PHP 2.0 is vulnerable to SQL Injection in user/reset-password.php via the mobileno parameter.
CVSS 8.1
CVE-2025-57147 WRITEUP HIGH
Phpgurukul Complaint Management System - SQL Injection
A SQL Injection vulnerability was found in phpgurukul Complaint Management System 2.0. The vulnerability is due to lack of input validation of multiple parameters including fullname, email, and contactno in user/registration.php.
CVSS 7.5
CVE-2025-57148 WRITEUP CRITICAL
Phpgurukul Online Shopping Portal - Unrestricted File Upload
phpgurukul Online Shopping Portal 2.0 is vulnerable to Arbitrary File Upload in /admin/insert-product.php, due to the lack of extension validation.
CVSS 9.1
CVE-2025-57149 WRITEUP MEDIUM
Phpgurukul Complaint Management System - SQL Injection
phpgurukul Complaint Management System 2.0 is vulnerable to SQL Injection in /complaint-details.php via the cid parameter.
CVSS 6.5
CVE-2025-57150 WRITEUP HIGH
Phpgurukul Complaint Management System - XSS
phpgurukul Complaint Management System in PHP 2.0 is vulnerable to Cross Site Scripting (XSS) in admin/subcategory.php via the categoryName parameter.
CVSS 7.2
CVE-2025-57151 WRITEUP HIGH
Phpgurukul Complaint Management System - XSS
phpgurukul Complaint Management System 2.0 is vulnerable to Cross Site Scripting (XSS) in admin/userprofile.php via the fullname parameter.
CVSS 8.8
CVE-2026-28809 WRITEUP MEDIUM
XXE in esaml SAML library allows local file read and potential SSRF
XML External Entity (XXE) vulnerability in esaml (and its forks) allows an attacker to cause the system to read local files and incorporate their contents into processed SAML documents, and potentially perform SSRF via crafted SAML messages. esaml parses attacker-controlled SAML messages using xmerl_scan:string/2 before signature verification without disabling XML entity expansion. On Erlang/OTP versions before 27, Xmerl allows entities by default, enabling pre-signature XXE attacks. An attacker can cause the host to read local files (e.g., Kubernetes-mounted secrets) into the SAML document. If the attacker is not a trusted SAML SP, signature verification will fail and the document is discarded, but file contents may still be exposed through logs or error messages. This issue affects all versions of esaml, including forks by arekinath, handnot2, and dropbox. Users running on Erlang/OTP 27 or later are not affected due to Xmerl defaulting to entities disabled.
CVE-2026-30613 WRITEUP MEDIUM
AZIOT 1 Node Smart Switch 1.1.9 - Info Disclosure
An information disclosure vulnerability exists in AZIOT 1 Node Smart Switch (16amp)- WiFi/Bluetooth Enabled Software Version: 1.1.9 due to improper access control on the UART debug interface. An attacker with physical access can connect to the UART interface and obtain sensitive information from the serial console without authentication.
CVSS 4.6
CVE-2026-31058 WRITEUP MEDIUM
UTT Aggressive HiPER 1200GW v2.5.3-170306 - Buffer Overflow
UTT Aggressive HiPER 1200GW v2.5.3-170306 was discovered to contain a buffer overflow in the timeRangeName parameter of the formConfigDnsFilterGlobal function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31059 WRITEUP CRITICAL
UTT Aggressive HiPER 520W v3v1.7.7-180627 - RCE
A remote command execution (RCE) vulnerability in the /goform/formDia component of UTT Aggressive HiPER 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string.
CVSS 9.8
CVE-2026-31060 WRITEUP MEDIUM
UTT Aggressive HiPER 810G v3v1.7.7-171114 - Buffer Overflow
UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the notes parameter of the formGroupConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31061 WRITEUP MEDIUM
UTT Aggressive HiPER 810G v3v1.7.7-171114 - Buffer Overflow
UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the timestart parameter of the ConfigAdvideo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31062 WRITEUP MEDIUM
UTT Aggressive 520W v3v1.7.7-180627 - Buffer Overflow
UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow in the filename parameter of the formFtpServerDirConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31063 WRITEUP MEDIUM
UTT Aggressive HiPER 1200GW 2.5.3-170306 - Buffer Overflow
UTT Aggressive HiPER 1200GW v2.5.3-170306 was discovered to contain a buffer overflow in the pools parameter of the formArpBindConfig function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31065 WRITEUP MEDIUM
UTT Aggressive 520W v3v1.7.7-180627 - Buffer Overflow
UTT Aggressive 520W v3v1.7.7-180627 was discovered to contain a buffer overflow in the addCommand parameter of the formConfigCliForEngineerOnly function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31066 WRITEUP MEDIUM
UTT Aggressive HiPER 810G v3v1.7.7-171114 - Buffer Overflow
UTT Aggressive HiPER 810G v3v1.7.7-171114 was discovered to contain a buffer overflow in the selDateType parameter of the formTaskEdit function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVSS 4.5
CVE-2026-31067 WRITEUP MEDIUM
UTT Aggressive 520W v3v1.7.7-180627 - RCE
A remote command execution (RCE) vulnerability in the /goform/formReleaseConnect component of UTT Aggressive 520W v3v1.7.7-180627 allows attackers to execute arbitrary commands via a crafted string.
CVSS 6.8
CVE-2026-31150 WRITEUP MEDIUM
Kaleris YMS 7.2.2.1 - Incorrect Access Control
Incorrect access control in Kaleris YMS v7.2.2.1 allows authenticated attackers with only the shipping/receiving role to view the truck's dashboard resources.
CVSS 4.3
CVE-2026-31151 WRITEUP CRITICAL
Kaleris YMS 7.2.2.1 - Auth Bypass
An issue in the login mechanism of Kaleris YMS v7.2.2.1 allows attackers to bypass login verification to access the application 's resources.
CVSS 9.8
CVE-2026-31153 WRITEUP MEDIUM
Bynder 0.1.394 - Stored XSS
A stored cross-site scripting (XSS) vulnerability in Bynder v0.1.394 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CVSS 5.4
CVE-2025-65657 WRITEUP MEDIUM
FeehiCMS 2.1.1 - RCE
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
CVSS 6.5
CVE-2025-63523 WRITEUP MEDIUM
FeehiCMS <2.1.1 - Info Disclosure
FeehiCMS version 2.1.1 fails to enforce server-side immutability for parameters that are presented to clients as "read-only." An authenticated attacker can intercept and modify the parameter in transit and the backend accepts the changes. This can lead to unintended username changes.
CVSS 6.5
CVE-2025-63522 WRITEUP MEDIUM
FeehiCMS 2.1.1 - CSRF
Reverse Tabnabbing vulnerability in FeehiCMS 2.1.1 in the Comments Management function
CVSS 4.6
CVE-2025-63520 WRITEUP MEDIUM
FeehiCMS 2.1.1 - XSS
Cross Site Scripting (XSS) vulnerability in FeehiCMS 2.1.1 via the id parameter of the User Update function (?r=user%2Fupdate).
CVSS 6.1