header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Geeklog <=1.5.2 SEC_authenticate()/PHP_AUTH_USER sql injection exploit

This exploit takes advantage of a SQL injection vulnerability in the Geeklog software version 1.5.2 and below. The vulnerability exists in the SEC_authenticate()/PHP_AUTH_USER function. By exploiting this vulnerability, an attacker can execute arbitrary SQL queries in the application's database.

Local require() vulnerability in iDB (a PHP/MySQL BBS)

This exploit takes advantage of a local require() vulnerability in iDB, a PHP/MySQL BBS. The vulnerability allows an attacker to include arbitrary local files by manipulating the 'skin' variable before it is saved to the database. By setting the 'skin' variable to a malicious value, an attacker can include sensitive files, such as the passwd file, and retrieve their contents. The vulnerability is limited by the length of the 'skin' variable, which is restricted to 26 characters.

Recent Exploits: