header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Myiosoft EasyBookMarker v4 (Parent) SQL Injection Vulnerability

Myiosoft EasyBookMarker v4 (Parent) is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information such as version and user details. The vulnerable parameter is 'Parent' which can be found in the URL http://localhost/[path]/plugins/bookmarker/bookmarker_backend.php?pagebm=mfolders&Parent=-99999/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(version(),0x3a,user()),5--

Domain Seller Pro� v1.5 SQL Injection Vulnerability

A SQL injection vulnerability exists in Domain Seller Pro� v1.5. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to unauthorized information or to manipulate data. This vulnerability affects the 'index.php' script and is triggered when the 'id' parameter is supplied with a maliciously crafted value. This can be exploited to inject arbitrary SQL code in the applications' back-end database, allowing for the manipulation of query results and the retrieval of sensitive data from the database.

e-topbiz Number Links 1 php ( id ) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in e-topbiz Number Links 1 php. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to manipulate the database. This can be exploited to gain access to sensitive information or to manipulate certain data.

XSS / FD Vulnerability

A vulnerability exists in Mini Web Calendar, ver. 1.2, which allows an attacker to perform Cross-Site Scripting (XSS) and File Disclosure (FD) attacks. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary HTML and script code in the context of the affected application or to disclose sensitive information from the server.

E-topbiz Online Store 1 Remote File Sql Injection

E-topbiz Online Store 1 is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects version 1.0; other versions may also be vulnerable.

deltascripts phpclassifieds Remote Sql inj.

An attacker can exploit a SQL injection vulnerability in deltascripts phpclassifieds to gain access to sensitive information from the database. The vulnerability exists in the detail.php page, which takes a parameter called 'siteid'. An attacker can inject malicious SQL code into this parameter, which will be executed by the database. This can be used to gain access to sensitive information such as usernames, passwords, and other data stored in the database.

MyioSoft EasyCalendar Remote Auth Bypass Vulnerability

A vulnerability in MyioSoft EasyCalendar allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. Generally, the admin name is 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/EasyCalendar/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.

MyioSoft EasyBookMarker Remote Auth Bypass Vulnerability

A vulnerability in MyioSoft EasyBookMarker allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. Generally, the admin name is 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/EasyBookMarker/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.

MyioSoft Ajax Portal 3.0 Remote Auth Bypass Vulnerability

A vulnerability in MyioSoft Ajax Portal 3.0 allows an attacker to bypass authentication by using the username [real_admin_name] ' or ' 1=1 and the password ZoRLu. The admin name is generally 'admin'. A demo of the exploit can be found at http://myiosoft.com/products/AjaxPortal/demo/ with the username demo1 ' or ' 1=1 and the password ZoRLu.

Recent Exploits: