header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sepcity Classified Remote SQL Injection Vulnerability

A vulnerability exists in Sepcity Classified which allows an attacker to view the admin username and password in plaintext. This is done by appending 'union select 0,1,username,3 from members' to the URL for the username and 'union select 0,1,password,3 from members' for the password. The admin login page is located at http://site.com/[path]/admclassifieds.asp.

Joomla Component com_na_content 1.0 Blind SQL Injection Vuln

A Blind SQL Injection vulnerability exists in Joomla Component com_na_content 1.0. An attacker can exploit this vulnerability by sending specially crafted requests to the vulnerable application. The vulnerable parameter is ‘id’ which is passed as a GET parameter in the request. An attacker can inject malicious SQL queries in the ‘id’ parameter and execute them in the backend database. This can be done by sending requests like /index.php?option=com_na_content&task=view&id=1 having 1=0 or /index.php?option=com_na_content&task=view&id=1 and substring(@@version,1,1)=4.

NetCat Blind SQL Injection Exploit

NetCat Blind SQL Injection exploit is a vulnerability in NetCat CMS versions <= 3.12 which allows an attacker to gain access to the database and extract sensitive information. The exploit works by sending a specially crafted HTTP request to the target server and then analyzing the response time to determine if the query was successful or not. The exploit can be used to brute force the login and password-hash of the user.

Lawyer Portal <= SQL Injection Vulnerability

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'ID' parameter to '/faculty/deptdisplay.asp' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to disclose sensitive information, modify data, compromise the system, etc.

Ultimate PHP Board <= 2.2.1 (log inj) Privilege Escalation Exploit

This exploit is used to escalate privileges of a user to admin in Ultimate PHP Board <= 2.2.1. It is done by sending a malicious HTTP request to the server. The malicious request contains a crafted User-Agent header which contains the user ID and email address of the user. This exploit is written in Perl language.

FubarForum 1.6 SQL Injection Vulnerability

FubarForum version 1.6 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

TaskDriver <= 1.3 Remote Change Admin Password Exploit

This exploit uses an insecure cookie handling flaw in order to compromisse the system. In the beginning, it is almost like the one that Silentz wrote for version 1.2 but not exactly. There is no need to use SQL injection for gaining admin password (hash). We can just set cookie value to 'auth=fook!admin', access profileedit.php and change his password for whatever we want to.

eDContainer v2.22 (lg) Local File Inclusion Vulnerability

eDContainer v2.22 (lg) is prone to a local file inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to view sensitive files on the affected computer; other attacks are also possible.

eDNews v2 (lg) Local File Inclusion Vulnerability

eDNews v2 (lg) Local File Inclusion Vulnerability allows an attacker to include a file from the localhost or a remote host. This vulnerability is due to the fact that the application fails to properly sanitize user-supplied input. A remote attacker can exploit this vulnerability to include arbitrary files from the localhost or a remote host.

Recent Exploits: