header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DuhokForum <= 1.1 (index.php) SQL Injection Vulnerability

DuhokForum version 1.1 is vulnerable to a SQL injection attack. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable index.php page. This can be done by sending a specially crafted URL to the vulnerable page, such as http:localhost/duhokfrm/index.php?modd=[Inj3ct Here ;)]. This will allow the attacker to execute arbitrary SQL commands on the underlying database.

Magneto ICMP ActiveX v4.0.0.20 ICMPSendEchoRequest Remote Code Execute

A vulnerability in Magneto ICMP ActiveX v4.0.0.20 allows remote attackers to execute arbitrary code via a crafted web page. The vulnerability exists in the ICMPSendEchoRequest function of SKIcmp.ocx, which can be exploited to control the edx register. An attacker can leverage this vulnerability to execute arbitrary code in the context of the user running the affected application.

HB ECOMMERCE SQL Injection Vulnerability

HB ECOMMERCE is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the customers table and dump passwords in plaintext. The vulnerable URL is /templates1/view_product.php?product=, where the attacker can inject malicious SQL code. An example of a malicious URL is http://localhost/templates1/view_product.php?product=94746%20AND%20%28SEL=ECT%20716%20FROM%28SELECT%20COUNT%28%2A%29%2CCONCAT%28CHAR%2858%2C122%2C99%=2C109%2C58%29%2C%28SELECT%20MID%28%28IFNULL%28CAST%28email%20AS%20CHAR%29%2CCHAR%2832%29%29%29%2C1%2C50%29%20FROM%20%60web34-hbecommerc%60.customers%20LIMIT%205%2C1%29%2CCHAR%2858%2C109%2C103%2C100%2C58%29%2CFLOOR%28RAND%280%29%2A2%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%2 9a%29%20

SQL Injection in ExtCalendar 2

The vulnerability exists due to failure in the "cal_search.php" script to properly sanitize user-supplied input in "search" variable. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.

Recent Exploits: