header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Configuration Tool 1.6.53 – ‘OpLclSrv’ Unquoted Service Path

The Configuration Tool version 1.6.53 is vulnerable to an unquoted service path vulnerability. The 'OpLclSrv' service has an unquoted service path, which can allow an attacker to escalate privileges and execute arbitrary code with elevated privileges.

CatDV 9.2 – RMI Authentication Bypass

The exploit allows an attacker to bypass authentication in CatDV version 9.2 and lower. By manipulating the getValidSession() function, the attacker can generate a valid session and gain unauthorized access to the server. This vulnerability can be exploited remotely through the RMI protocol.

Online Ordering System 1.0 – Blind SQL Injection (Unauthenticated)

The Online Ordering System 1.0 is vulnerable to blind SQL injection. An attacker can exploit this vulnerability by injecting malicious SQL queries into the 'id' parameter of the design.php page. By manipulating the SQL queries, an attacker can extract sensitive information from the database or perform unauthorized actions.

LogonExpert 8.1 – ‘LogonExpertSvc’ Unquoted Service Path

The LogonExpert 8.1 software installed on Windows 7 Service Pack 1 x64 is vulnerable to an unquoted service path vulnerability. The LogonExpertSvc service has an unquoted service path, which can allow an attacker to escalate privileges and execute arbitrary code with elevated privileges. The vulnerability exists due to the service path not being enclosed in double quotes. By placing a malicious executable in a specific location, an attacker can take advantage of the unquoted service path vulnerability to execute arbitrary code during the service startup. This can lead to a complete compromise of the affected system.

HFS (HTTP File Server) 2.3.x – Remote Command Execution (3)

This exploit allows an attacker to execute arbitrary commands on a target system running HFS (HTTP File Server) version 2.3.x. The vulnerability exists due to improper handling of user input, which allows an attacker to inject malicious commands. By exploiting this vulnerability, an attacker can gain unauthorized access and execute commands with the privileges of the HFS application.

Online Exam System With Timer 1.0 – ’email’ SQL injection Auth Bypass

This application is vulnerable to SQL injection vulnerability. The exploit allows bypassing authentication by injecting SQL payload in the 'email' field. By using the payload ' or 'x'='x in the email and password fields, the attacker can directly enter into the Admin Panel page.

PEEL Shopping 9.3.0 – ‘Comments/Special Instructions’ Stored Cross-Site Scripting

This application is vulnerable to Stored XSS vulnerability. The vulnerable script is http://localhost/peel-shopping_9_3_0/achat/achat_maintenant.php and the vulnerable parameter is 'Comments / Special Instructions :'. The payload used for exploitation is jaVasCript:/*-/*`/*`/*'/*"/**/(/* */oNcliCk=alert())//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>x3csVg/<sVg/oNloAd=alert()//>x3e

Recent Exploits: