header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

URL Rotator ( id ) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to the 'tr.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow an attacker to gain access to the vulnerable application, disclose sensitive information, modify data, etc.

Classifieds Hosting( id ) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of 'tr.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can allow the attacker to compromise the application and the underlying system; other attacks are also possible.

Category Addon (tr.php id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'id' parameter in 'tr.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.

Downline Goldmine Builder (tr.php id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to the 'tr.php' script. A remote attacker can execute arbitrary SQL commands in the application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.

Classifieds Blaster (id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to 'tr.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. For example, an attacker can execute the following SQL query: tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--

Reminder Service (id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'id' parameter in 'tr.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. For example, an attacker can inject the following payload: tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--

Scrolling Text Ads (id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to 'tr1.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject own SQL commands, read sensitive data from the database, modify or delete data. Successful exploitation requires knowledge of the database structure and may lead to full compromise of the application.

Recent Exploits: