header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Drinks Script

The Drinks Script is vulnerable to a SQL injection attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This request contains malicious SQL statements that are executed in the backend database. This can allow an attacker to gain access to sensitive information such as usernames and passwords.

Pre Job Board Pro (id) Remote Admin Bypass Vulnerability

Pre Job Board Pro (id) is vulnerable to a remote admin bypass vulnerability. This vulnerability allows an attacker to gain access to the admin panel without authentication. This is due to a lack of authentication check in the admin panel. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application.

Dada Mail Manager Component 2.6 Remote File Inclusion Vulnerability

A remote file inclusion vulnerability exists in com_dadamail version 2.6. The vulnerable file is administrator/components/com_dadamail/config.dadamail.php, which includes the file default.php from the same directory. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file from a remote host.

DFLabs PTK Local Command Execution Vulnerability

As reported in the project website, "PTK is an alternative advanced interface for the suite TSK (The Sleuth Kit). [...] PTK is not just a new graphic and highly professional interface based on Ajax technology but offers a great deal of features like analysis, search and management of complex cases of digital investigation". PTK is included within the SANS Investigative Forensic Toolkit (SIFT) Workstation. This application is vulnerable to multiple input validation attacks. The possibility to exploit these findings introduces several malicious scenarios. For instance, a criminal may abuse this specific vulnerability to modify the evidence of the crime, compromising the digital investigation workstation. Even if the original evidence should be accessed only in read-only mode, using also hardware write blockers according to forensic best practices, several malicious scenarios are possible with just the alteration of the working copy image. Additionally, a payload could be crafted to hide, or alter, just the information presented to the analyst, something which would not be evident unless the same image is analyzed with a tool not vulnerable to the attack. In our research, we have developed a reliable Proof-of-Concept in order to exfiltrate data from the system.

Pre Multi-Vendor Shopping Malls Multiple Vulnerabilities

Pre Multi-Vendor Shopping Malls is vulnerable to insecure cookie handling and SQL injection. An attacker can inject malicious code into the cookie and gain access to the admin panel. An attacker can also inject malicious SQL code into the buyer_detail.php page to gain access to the admin credentials.

Recent Exploits: