header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Real Estate Portal v1.2 (ad_id) Remote SQL Injection Vulnerability

A vulnerability exists in Real Estate Portal v1.2, which allows an attacker to inject malicious SQL queries via the 'ad_id' parameter in the 're_send_email' module. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords.

Nero ShowTime v5.0.15.0 m3u Playlist File Remote Buffer Overflow PoC

Nero ShowTime is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Successfully exploiting these issues may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will cause denial-of-service conditions. Nero ShowTime 5.0.15.0 is vulnerable, prior versions may also be affected.

MODx CMS <= 0.9.6.2 Multiple Remote Vulne ( RFI + XSS)

MODx CMS version 0.9.6.2 is vulnerable to Remote File Inclusion (RFI) and Cross-Site Scripting (XSS). An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The RFI vulnerability exists in the snippet.reflect.php file in the assets/snippets/reflect/ directory. The XSS vulnerability exists in the index.php file in the main directory. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.

PG Job Site homepage.php (poll_view_id) Blind Sql inj.

A Blind SQL Injection vulnerability exists in PG Job Site homepage.php. An attacker can send a specially crafted HTTP request to the vulnerable application in order to exploit this vulnerability. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.

PG Roomate Finder Solution Auth Bypass

An attacker can bypass authentication by using the username 'real_admin_name' ' or ' 1=1 and the password ZoRLu. Generally, the admin username is 'admin' and the attacker can use the username 'admin' ' or ' 1=1-- and the password ZoRLu to bypass authentication.

PG Real Estate Solution Auth Bypass

An authentication bypass vulnerability exists in PG Real Estate Solution. An attacker can exploit this vulnerability by supplying a specially crafted username and password. The username should be the real admin name followed by ' or ' 1=1 and the password should be ZoRLu. Generally, the admin name is 'admin'. The exploit for demo is to login to http://www.realtysoft.pro/realestate/demo/admin/index.php with username 'admin ' or ' 1=1--' and password ZoRLu.

NetArtMedia Cars Portal Remote SQL Injection Vulnerability

NetArtMedia Cars Portal is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.

Recent Exploits: