header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PRE PODCAST PORTAL (Tour.php id) SQL Injection Vulnerability

A SQL injection vulnerability exists in PRE PODCAST PORTAL, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in Tour.php. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords from the database.

phpBB Mod Small ShoutBox 1.4 Remote Edit/Delete Messages Vuln

A vulnerability exists in phpBB Mod Small ShoutBox 1.4 which allows an attacker to remotely execute code. This is due to the application not properly sanitizing user-supplied input to the 'id' parameter in the 'shoutbox_view.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an SQL query to the vulnerable script. This can allow the attacker to delete or edit messages, as well as perform a blind SQL injection attack.

Adobe Reader ‘util.printf()’ JavaScript Function Stack Buffer Overflow Exploit

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the util.printf() JavaScript function. This function does not properly validate the length of user supplied data before copying it to a fixed length stack buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the user.

SMF 1.1.6 Remote Code Execution Exploit

SMF suffers from multiple vulnerabilities. Combining some of them, we can obtain a remote code execution on the remote host. The admin is supposed to go on this URL http://[website]/SMF/index.php?action=packages;sa=install2;package=[filename] (1) and since $_REQUEST['package'] is not checked, we can install any package we want, even a malicious one.

Way Of The Warrior <= 5.0 Local/Remote File Inclusion Vulnerability

Way Of The Warrior is vulnerable to Local/Remote File Inclusion. The vulnerability is due to the 'plancia' parameter in 'visualizza.php' and 'crea.php' scripts not properly sanitized before being used to include files. This can be exploited to include arbitrary files from local resources and remote resources by passing an URL as a parameter.

Tours Manager v1 (cityview.php cityid) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can be done by appending malicious SQL statements to the vulnerable parameter that is passed to the application. This can allow an attacker to gain access to the database and potentially gain access to sensitive information.

Recent Exploits: