header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ocean12 FAQ Manager Pro

The vulnerability is a Blind SQL Injection vulnerability which can be exploited by sending a crafted HTTP request with a malicious payload. The malicious payload can be sent in the form of a URL parameter, such as 'site.com/?Action=Cat&ID=40%20and%201=1 true' or 'site.com/?Action=Cat&ID=40%20and%201=0 false'. This can be exploited using automated tools such as sqlmap.

CMS little (index.php term) Remote SQL Injection Exploit

This exploit allows an attacker to gain access to the admin user of the CMS little application. The exploit is possible due to a vulnerability in the index.php file, which allows an attacker to inject malicious SQL code into the 'term' parameter. The exploit requires the magic_quotes_gpc to be set to off.

Multiple Exploits in Web Calendar System v 3.22/3.40/3.05/3.23

The Web Calendar System v 3.22/3.40/3.05/3.23 is vulnerable to multiple exploits such as XSS, remote bypass exploit and remote SQL injection. An attacker can exploit these vulnerabilities by sending a malicious payload in the form of a POST request to the vulnerable website. The payload can be used to bypass authentication and gain access to the website. Additionally, an attacker can use the payload to inject malicious code into the website, which can be used to steal sensitive information such as cookies.

Basic PHP CMS (index.php id) Blind SQL Injection Vulnerability

A vulnerability exists in the Basic PHP CMS application due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'index.php' script. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database. This can be exploited to manipulate data, disclose sensitive information, and compromise the application and the underlying system.

Recent Exploits: