header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Simple Grocery Store Sales And Inventory System 1.0 – Authentication Bypass

A vulnerability exists in Simple Grocery Store Sales And Inventory System 1.0 which allows an attacker to bypass authentication by using payload jyot' or 1=1# in user and password field. This can be exploited by sending a malicious request with the payload to the ajax.php file.

rConfig 3.9.5 – Remote Code Execution (Unauthenticated)

rConfig 3.9.5 is vulnerable to Remote Code Execution (RCE) without authentication. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable application. The payload can be sent either by creating a new user with a malicious ulevelid parameter or by sending a malicious payload to the ajax/ajax_editFile.php page.

Guild Wars 2 – Insecure Folder Permissions

Guild Wars 2 Launcher (Gw2-64.exe) suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full) for 'Everyone' group, making the entire directory 'Guild Wars 2' and its files and sub-dirs world-writable.

TimeClock Software 1.01 Authenticated Time-Based SQL Injection

TimeClock Software 1.01 is vulnerable to an authenticated time-based SQL injection vulnerability. This vulnerability allows an attacker to enumerate valid usernames from the application's database. The exploit is achieved by sending a specially crafted HTTP POST request to the add_entry.php page with a malicious payload in the 'notes' parameter. If the username is valid, the application will delay its response for 5 seconds, allowing the attacker to detect the valid username.

Battle.Net 1.27.1.12428 – Insecure File Permissions

Battle.Net Launcher (Battle.net.exe) suffers from an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'F' flag (Full) for 'Users' group, making the entire directory 'Battle.net' and its files and sub-dirs world-writable.

Online Students Management System 1.0 – ‘username’ SQL Injections

The files index.php on the main login page, and the index.php on the /admin/ login page does not perform input validation on the regno and username parameters. An attacker can send malicious input in the post request to http://localhost/index.php or either http://localhost/admin/index.php and bypass authentication, extract sensitive information etc.

Liman 0.7 – Cross-Site Request Forgery (Change Password)

There is no CSRF protection in Liman application, with a little help of social engineering (like sending a link via email/chat) an attacker may force the victim to click on a malicious link, with the purpose of manipulating his current account information, or changing entirely his password.

Recent Exploits: