header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Silentum LoginSys 1.0.0 Insecure Cookie Handling

If we log in correctly, a cookie is set with name "logged_in" and as content the username name. An attacker can exploit this vulnerability by setting the cookie content to the username's password. The exploit code is javascript:document.cookie = "logged_in=admin_username; path=/" where admin_username is the nick of the administrator.

ForumApp V3.3 Remote Database Disclosure Vulnerability

A vulnerability in ForumApp V3.3 allows an attacker to remotely disclose the database of the application. This vulnerability is due to the application not properly validating user-supplied input. An attacker can exploit this vulnerability by sending a malicious request to the vulnerable application. Successful exploitation will result in the disclosure of the application's database.

PHP-Fusion Mod TI – Blog System Sql Injection

A SQL injection vulnerability exists in the blog system of PHP-Fusion Mod TI. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input in the 'blog_id' parameter of the 'blog.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This will allow the attacker to gain access to the database and execute arbitrary SQL commands.

AlstraSoft Web Email Script Enterprise (id) Remote SQL Injection Vuln.

AlstraSoft Web Email Script Enterprise (id) is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

ChilkatSocket.DLL Arbitrary File Creation ChilkatFTP.dll v3.0.0.2 Arbitrary Data Write Exploit

A vulnerability exists in ChilkatSocket.DLL and ChilkatFTP.dll v3.0.0.2 which allows an attacker to create arbitrary files on the system. This is achieved by using the SaveLastError() method of the ChilkatSocket.DLL object. An attacker can use this vulnerability to create malicious files on the system.

DeluxeBB <= 1.2 Remote Blind SQL Injection Exploit

DeluxeBB is vulnerable to a blind SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as user credentials. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'username' parameter of the 'misc.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to the database and extraction of sensitive information.

Recent Exploits: