header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Android Application MakeMyTrip 7.2.4 – Unencrypted Database Files

Android application folder was found to contain SQLite database files in the following subdirectory data/com.makemytrip/Cache and data/com.makemytrip/databses. This directory is used to store the application’s databases. The confidential information can be retrieved from the SQLite databases and stored in cleartext. As an impact it is known to affect confidentiality, integrity, and availability. The successful exploitation needs a single authentication and filesystem can be accessed, after rooting an android device. After accessing the directories below /data/com.makemytrip/databases/ and /data/com.makemytrip/cache/, above directories can be seen with unencrypted version of database files stored in the device which can further lead to sensitive information disclosure.

PaulPrinting CMS Printing 1.0 – SQL Injection

Any visitor can run code to exploit css and sql vulnerabilities in the products and order sections. An example parameter with a demo site is provided, as well as time-based blind SQL, boolean-based blind SQL, and error-based SQL payloads. All parameters are affected.

Dell EMC RecoverPoint boxmgmt CLI < 5.1.2 - Arbitrary File Read

When logging in as boxmgmt and running an internal command, the ssh command may be used to display the contents of files from the file system which are accessible to the boxmgmt user. Log in as boxmgmt via SSH (default credentials boxmgmt/boxmgmt) Select [3] Diagnostics Select [5] Run Internal Command ssh -F /etc/passwd 127.0.0.1

Nordex N149/4.0-4.5 Wind Turbine Web Server – SQL Injection

A SQL injection vulnerability exists in the Nordex N149/4.0-4.5 Wind Turbine Web Server. An attacker can send a specially crafted POST request to the login.php page with malicious SQL code in the login parameter to execute arbitrary SQL commands on the underlying database.

Wchat – Fully Responsive PHP AJAX Chat Script 1.5 – Persistent cross site scripting

Wchat is vulnerable to persistent cross site scripting. An attacker can inject malicious JavaScript code into the textarea of the 'Edit profile' page. The malicious code will be executed when someone visits the profile page.

Model Agency Media House & Model Gallery 1.0 – Persistent Cross-Site Scripting / Cross-Site Request Forgery / Authentication bypass

Model Agency - Media House & Model Gallery 1.0 suffers from multiple vulnerabilities. For Persistent Cross-Site Scripting, after creating an account, go to the profile and navigate to 'Update profile' and put the payload '/><script>alert(document.domain)</script>'. For Cross-Site Request Forgery, the attacker can use a form with hidden inputs to submit the data. For Authentication bypass, the attacker can bypass the admin panel without any authentication by using the username ' or 0=0 #' and any password.

Merge PACS 7.0 – Cross-Site Request Forgery

Merge PACS 7.0 is vulnerable to Cross-Site Request Forgery. An attacker can craft a malicious HTML page that contains a form with hidden parameters and submit it to the target server. This can be used to perform malicious actions on behalf of the user.

ChiefPDF Software Buffer Overflow

ChiefPDF Software Buffer Overflow is a vulnerability in ChiefPDF Software which allows an attacker to execute arbitrary code by overflowing a buffer in the program. The vulnerability affects PDF to Image Converter 2.0, PDF to Image Converter Free 2.0, PDF to Tiff Converter 2.0, and PDF to Tiff Converter Free 2.0. The exploit is triggered when a maliciously crafted string is pasted into the 'Registration - License Name' field. The exploit code is written in Python and is available on the author's website.

up.time 7.5.0 Upload And Execute File Exploit

up.time suffers from arbitrary command execution. Attackers can exploit this issue using the monitor service feature and adding a command with respected arguments to given binary for execution. In combination with the CSRF, Privilege Escalation, Arbitrary text file creation and renaming that file to php for example in arbitrary location and executing system commands with SYSTEM privileges.

Recent Exploits: