header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pixel8 Web Photo Album v3.0

A SQL injection vulnerability exists in Pixel8 Web Photo Album v3.0. An attacker can send a malicious HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the vulnerable parameter. This can be exploited to disclose the content of the back-end database.

Vacation Estate Listing Blind Sql

The Vacation Estate Listing Blind SQL Injection vulnerability allows an attacker to inject malicious SQL queries into the vulnerable application. This can be done by manipulating the 'editid1' parameter of the 'properties_view.php' page. An attacker can use the substring() function to check the version of the database server. For example, 'properties_view.php?editid1=2 and substring(@@version,1,1)=4' and 'properties_view.php?editid1=2 and substring(@@version,1,1)=5' can be used to check the version of the database server.

CMScout 2.06 Remote SQL Injection/Local File Inclusion

CMScout 2.06 is vulnerable to both Remote SQL Injection and Local File Inclusion. For Remote SQL Injection, an attacker must be logged in as a normal user and add a download. For Local File Inclusion, vulnerable code in admin.php and index.php can be exploited.

Flexphpic 0.0.4 & Flexphpic Pro 0.0.3 – ‘ or ‘1=1 SQL Injection Vulnerability

A vulnerability exists in Flexphpic 0.0.4 & Flexphpic Pro 0.0.3 due to improper sanitization of user-supplied input in the 'username' and 'password' parameters of the 'usercheck.php' script. An attacker can exploit this vulnerability to inject arbitrary SQL code into the application, allowing them to bypass authentication and gain access to the application.

Remote SQL InjEcti0n Vulnerability

A malicious attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The attacker can inject malicious SQL queries in the vulnerable parameter and execute arbitrary SQL commands in the database. This can be used to bypass authentication, access, modify and delete data in the back-end database.

eDNews v2 SQL Injection Vulnerability

eDNews v2 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. This issue affects version 2; other versions may also be vulnerable.

Linux Kernel < 2.6.26.4 SCTP kernel memory disclosure

The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.

Recent Exploits: