header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

minimal-ablog 0.4 SQL Injection, File Upload and Admin Bypass Vuln

When a user visits the index.php page with a malicious SQL query, it is possible to inject malicious code into the database. Additionally, the uploader.php page can be used to upload malicious files, and the admin page can be bypassed to gain admin privileges.

KTPCCD CMS Blind SQL Injection Vulnerability

A vulnerability exists in KTP Computer Customer Database CMS version 1, which allows an attacker to perform a blind SQL injection attack. The vulnerability is due to insufficient sanitization of user-supplied input in the 'tid' parameter of the 'vtech' action of the 'tech' module. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database, potentially resulting in the manipulation or disclosure of arbitrary data. Authentication is not required to exploit this vulnerability.

Active Business Directory v 2

The Active Business Directory v 2 is vulnerable to a SQL injection vulnerability. This vulnerability allows an attacker to execute arbitrary SQL commands on the underlying database. By sending a specially crafted HTTP request to the vulnerable application, an attacker can exploit this vulnerability to gain access to sensitive information stored in the database.

Cain & Abel v4.9.23 (rdp file) Buffer Overflow PoC

When Using Remote Desktop Password Decoder in Cain and Importing '.rdp' file contains long Chars(ex:8250 chars), the Program Will crash. This Poc Will Gonna Overwrite the Pointer to next SEH With '42424242' and The SE Handler with '43434343'.

Remote Blind SQL Injection Vulnerability

Active Bids, a software developed by www.activewebsoftwares.com, is vulnerable to a Remote Blind SQL Injection vulnerability. This vulnerability can be exploited by sending a maliciously crafted HTTP request to the vulnerable server. An attacker can use this vulnerability to gain access to sensitive information stored in the database, such as usernames and passwords. The vulnerability can be exploited by sending a maliciously crafted HTTP request to the vulnerable server, such as http://site.il/activebids/bidhistory.asp?ItemID=354%20and%201=1 and http://site.il/activebids/bidhistory.asp?ItemID=354%20and%201=0. An attacker can use this vulnerability to gain access to sensitive information stored in the database, such as usernames and passwords.

VoteHistory.asp AccountID Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability was discovered in ActiveVotes v 2.2, which is a web-based voting system developed by www.activewebsoftwares.com. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

Bypass Config Download Vulnerability

Oramon is vulnerable to a bypass config download vulnerability. This vulnerability allows an attacker to download the configuration file of the application, which contains the database username and password. This vulnerability is due to the fact that the application does not properly validate user-supplied input. An attacker can exploit this vulnerability by directly requesting the configuration file.

Recent Exploits: