header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Web Calendar System v 3.12/3.30

The vulnerability is a combination of a remote bypass exploit and a remote XSS exploit. The remote bypass exploit can be triggered by sending a specially crafted HTTP request to the vulnerable application. The remote XSS exploit can be triggered by sending a specially crafted HTTP request to the vulnerable application.

TxtBlog (index.php m) Local File Inclusion Vulnerability

A vulnerability exists in TxtBlog v.1.0 Alpha, which allows an attacker to include arbitrary files from the local system. This is due to a lack of proper sanitization of user-supplied input to the 'y' and 'm' parameters in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../') to the vulnerable script. This will allow the attacker to include arbitrary files from the local system.

stararticles blind sql injection Vulnerability

Many of the pages of the stararticles application are vulnerable to blind SQL injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable page. For example, a request like http://www.kalptarudemos.com/demo/stararticle/article.download.php/1090%20and%20substring(@@version,1,1)=5 can be used to check if the application is vulnerable to blind SQL injection.

Post Affiliate Pro v.3 (index.php md) <= Blind $ql Injection

Post Affiliate Pro v.3 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'umprof_status' in the 'index.php' file. This can allow the attacker to gain access to the database and execute arbitrary code.

SQL Injection Vulnerability in POST Form

A SQL injection vulnerability exists in the POST form of CMS Ortus 1.12 and 1.13. An attacker can exploit this vulnerability by registering on the website, authenticating, and then editing the user profile. The attacker can then inject malicious SQL code into the “City” field to gain admin rights and access the admin area.

Jamit Job Board v.3 (index.php show_emp) <= Blind $ql Injection

Jamit Job Board v.3 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable parameter 'show_emp' in the 'index.php' page. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

FuzzyLime 3.03 Local File Iclude PoC

The vulnerability exists due to insufficient filtration of user-supplied input passed via the 'p' parameter to '/code/track.php' script. A remote attacker can send a specially crafted HTTP request with malicious 'p' parameter value and execute arbitrary PHP code on the vulnerable system.

Recent Exploits: