header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP Classified ads software

The PHP Classified ads software is vulnerable to Blind-Injection. An attacker can exploit this vulnerability by sending a maliciously crafted request to the browsecats.php page with a cid parameter. The attacker can then use the substring() function to determine the version of the software and gain access to the admin panel.

PHP link Directory software SQL Injection Vulnerability

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'sbcat_id' parameter to '/showcats.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.

Comerciosonline CMS SQLi

Comerciosonline CMS is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the database server through the web application. This can be done by manipulating the input parameters of the application. For example, an attacker can send a malicious SQL query to the application by appending it to the URL parameter 'codf' in the 'pp_productos.php' page. Additionally, an attacker can also exploit the URL redirection vulnerability in the 'anuncioredir.php' page by manipulating the 'redir' parameter.

Xnova Legacies 2009.2 CSRF

If a moderator visits a malicious link, they can grant themselves admin privileges, allowing them to control the game. The attack URL is http://SERVER/admin/paneladmina.php?result=usr_level&player=PLAYER&authlvl=3, where SERVER and PLAYER are replaced with the appropriate values.

MultiPowUpload v 2.1 Remote File Upload Vulnerability

A vulnerability exists in MultiPowUpload v 2.1 which allows an attacker to upload a malicious file to the server. By clicking the 'Browse' button and selecting a malicious file, the attacker can upload the file to the server. The malicious file can then be accessed at http://localhost/[path]/FileProcessingScripts/PHP/UploadedFiles/[SHELL.php].

SAP Crystal Report Server 2008 – Directory Traversal

SAP Crystal Report Server 2008 contains a variety of features with which users can manage and share interactive reports and dashboards, as well as provide access to them via the Internet. Directory Traversal vulnerability was found in script qa.jsp With this vulnerability, an authenticated attacker can read any file on the server.

Froxlor v 0.9.15 Remote file include vulnerbility

Froxlor v 0.9.15 is vulnerable to a remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a URL in the 'id' parameter of the 'customer_ftp.php' script. This URL points to a malicious file which is then included and executed on the vulnerable server.

Recent Exploits: