header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Powered by BosClassifieds remote sql inj

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the URL. For example, an attacker can send the following URL to the vulnerable application: http://localhost/script_path/index.php?cat_id=[SQL]. Where [SQL]= -9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--

BlackMagic Exploit

This exploit is used to bypass authentication of a vulnerable web application. It uses a binary search algorithm to guess the correct password by sending a series of HTTP POST requests. The exploit is written in Perl and uses the LWP::UserAgent and HTTP::Cookies modules.

SQL Injection Vuln.

The vulnerability exists in the 'products.php' script, which allows an attacker to inject arbitrary SQL commands via the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information from the database, such as usernames and passwords.

Maran PHP Shop (prodshow.php) SQL Injection Vulnerability

Maran PHP Shop is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing the attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

NetRisk <= 2.0 (XSS/SQL Injection) Remote Vulnerabilities

NetRisk version 2.0 and prior are vulnerable to Cross Site Scripting, Remote SQL Injection and Remote Blind SQL Injection. An attacker can inject malicious JavaScript code into the 'error' parameter of the 'index.php' page. An attacker can also inject malicious SQL code into the 'p' and 'id' parameters of the 'index.php' page. An attacker can also inject malicious SQL code into the 'p' and 'id' parameters of the 'index.php' page to perform a blind SQL injection attack.

Joovili Script Insecure Cookie Handling Vulnerability

Joovili Script version 3.1.4 is vulnerable to insecure cookie handling. An attacker can exploit this vulnerability by setting the session_id, session_logged_in, session_username, session_admin_id, session_admin_username, session_admin, session_staff_id, session_staff_username, and session_staff cookies to gain access to the application. For demo user, the attacker can set the session_id to 304, session_logged_in to true, and session_username to demo. For demo admin, the attacker can set the session_admin_id to 1, session_admin_username to admin, and session_admin to true. For demo staff, the attacker can set the session_staff_id to 3, session_staff_username to staff, and session_staff to true.

Shopping Cart ( index.php c ) Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability exists in Shopping Cart ( index.php c ) which allows an attacker to execute arbitrary SQL commands on the underlying database. This vulnerability is due to the lack of proper sanitization of user-supplied input to the 'c' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information stored in the database, modification of data, and even execution of arbitrary system commands.

Recent Exploits: