header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WinWaste.NET 1.0.6183.16475 – Privilege Escalation due Incorrect Access Control

WinWaste.NET version 1.0.6183.16475 (from Nica s.r.l., a Zucchetti Group company) allows a local unprivileged user to replace the executable with a malicious file that will be executed with 'LocalSystem' privileges. Attack Vectors: replacing the WinWasteService.exe and/or any tied .dll used by the software.

Scratch Desktop 3.17 – Cross-Site Scripting/Remote Code Execution (XSS/RCE)

CVE-2020-7750 was disclosed on Scratch's official forums on 21th of October 2020 by the forum user apple502j. The forum thread describes a cross-site scripting (XSS) vulnerability in Scratch and Scratch Desktop prior to 3.17.1. You can exploit the vulnerability by uploading a SVG (*.svg) file WITHOUT the viewBox attribute and embedding a malicious event handler. Example: <svg xmlns:xlink="http://www.w3.org/1999/xlink"><image href="doesNotExist.png" onerror="<INSERT JS PAYLOAD>" /></svg>. The malicious SVG can be uploaded as a sprite or stored within a Scratch project file (*.sb3), which is a regular ZIP archive by the way. The Scratch Desktop versions runs on Electron where the exploit can be used for remote code execution (RCE).

Vianeos OctoPUS 5 – ‘login_user’ SQLi

The 'login_user =' parameter present in the POST authentication request is vulnerable to an Time Based SQLi as follow: Parameter: login_user (POST) Type: time-based blind Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) Payload: signin_user=1&login_user=1' AND (SELECT 8860 FROM (SELECT(SLEEP(5)))xENj) AND 'OoKG'='OoKG&password_user=1

Online Voting System 1.0 – Remote Code Execution (Authenticated)

An authenticated remote code execution vulnerability exists in Online Voting System 1.0. By sending a specially crafted HTTP POST request, an attacker can inject malicious PHP code into the 'image' parameter of the 'save_candidate.php' script. This code will be uploaded to the server and can be executed by accessing the uploaded file with a GET request containing a 'cmd' parameter.

Online Voting System 1.0 – Authentication Bypass (SQLi)

Online Voting System 1.0 is vulnerable to authentication bypass due to an SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted payload to the application. This will allow the attacker to bypass authentication and gain access to the application.

Simple Traffic Offense System 1.0 – ‘Multiple’ Stored Cross Site Scripting (XSS)

Almost all inputs contain Stored XSS on the website. An attacker can send a malicious request with a Stored XSS payload to the Report Offense page. The payload will be triggered on the Dashboard and Offense list pages.

Recent Exploits: