header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GL.iNet <= 3.216 Remote Code Execution via OpenVPN Client

The GL.iNet <= 3.216 allows remote code execution via the OpenVPN client. An attacker can exploit this vulnerability by adding a malicious configuration file and client to the OpenVPN, which can lead to unauthorized access and potential compromise of the device. This vulnerability has been assigned CVE-2023-46456.

Atlassian Confluence Data Center and Server Authentication Bypass via Broken Access Control

This exploit leverages a broken access control vulnerability in Atlassian Confluence servers, enabling an attacker to bypass authentication. By sending a specially crafted request, an unauthorized admin account can be created on the targeted Atlassian server.

Customer Support System 1.0 – Multiple SQL Injection Vulnerabilities

Multiple SQL injection vulnerabilities were found in Customer Support System 1.0. These vulnerabilities can be exploited by authenticated attackers to run arbitrary SQL commands through the parameters department_id, customer_id, and subject.

TPC-110W Remote Command Execution

The code snippet demonstrates a C program that establishes a socket connection to a remote device with IP address 192.168.1.10 on port 8888. It then sends a command 'id' to the device, which is executed with root privileges. This vulnerability could be exploited by an attacker to remotely execute arbitrary commands on the target device.

TP-Link TL-WR740N Unauthenticated Directory Traversal

The exploit allows an attacker to access sensitive files like /etc/shadow on TP-Link TL-WR740N routers with firmware version 3.12.11 Build 110915 Rel.40896n. This can lead to unauthorized access and potential compromise of the device. This vulnerability has not been assigned a CVE yet.

Online Nurse Hiring System 1.0 – ‘bookid’ Time-Based SQL Injection

The 'bookid' parameter in Online Nurse Hiring System 1.0 is vulnerable to Time-Based SQL Injection. An attacker can exploit this vulnerability to manipulate the SQL query and cause delays in response.

Recent Exploits: