header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

StormBoard Version 1.0.1 (thread.php id=) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. This can be done by appending the malicious query to the vulnerable parameter in the URL. This can allow the attacker to gain access to the database and extract sensitive information.

phpLD 3.3 Blind SQL Injection

A Blind SQL Injection vulnerability exists in phpLD 3.3 when magic_quotes_gpc is set to Off and register_globals is set to On. An attacker can exploit this vulnerability by sending a specially crafted request to the page.php file with the 'name' parameter. The attacker can then use a series of True and False requests to extract data from the database. For example, an attacker can use the following request to extract the first character of the password from the PLD_USER table: (validpagename)' or ORD(MID((SELECT PASSWORD FROM PLD_USER WHERE ID = 1),1,1))>1#

PHPmotion <= 2.1 CSRF vulnerability

Social engineer a PHPMotion member to come to a web page with a hidden iframe on there, which pulls in an evil script from pwned.html. This will change the victim's password and email, using their credentials. Javascript is used to submit the form on page load.

Exploit for Roundcube Webmail =< 0.2-beta

This exploit is for Roundcube Webmail version 0.2-beta and below. It is a vulnerability in the html2text.php file, which is vulnerable to a preg_replace() / eval bug. The exploit allows an attacker to execute arbitrary PHP code on the vulnerable system.

REDPEACH CMS – SQL Injection Vulnerability

The Files 'index.php' and 'page.php' contain vulnerable SQL Querys at the GET Parameter 'zv'. In the most cases, a table prefix is needed, which is similar to the websites' name, followed by '_user'. The important column names are 'username' and 'password'. The number of columns is 8 almost everytime.

Recent Exploits: