header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Programs Rating (details.php id ) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable script. The crafted query can be sent as a parameter in the URL. For example, www.[target].com/Script/details.php?id=-1+union+select+1,version(),3,user(),0x48757373696E5F585F5F5761735F68657265,6,7,8,9,10--

Article Publisher PRO Insecure Cookie Handling Vulnerability

Article Publisher PRO version 1.5 is vulnerable to insecure cookie handling. An attacker can exploit this vulnerability by setting a malicious cookie with user_id and passwd_md5 values. This will allow the attacker to gain access to the application without authentication.

Flash Tree Gallery 1.0 Remote File Inclusion Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the 'mosConfig_live_site' parameter of the vulnerable 'admin.treeg.php' script. This can allow the attacker to execute arbitrary remote code on the vulnerable system.

Bloggie Lite 0.0.2 Beta SQl Injection by Insecure Cookie Handling

A SQL injection vulnerability exists in Bloggie Lite 0.0.2 Beta due to insecure cookie handling. An attacker can exploit this vulnerability by setting a malicious cookie value in the 'f528764d624db129b32c21fbca0cb8d6' cookie parameter. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

SFS EZ Gaming Cheats remote sql inj

An attacker can exploit a SQL injection vulnerability in SFS EZ Gaming Cheats by sending a specially crafted HTTP request to view_reviews.php. The attacker can send a malicious SQL query to the vulnerable parameter 'id' in order to extract information from the database. The vulnerable code can be found in view_reviews.php. An example of a malicious request is http://localhost/script_path/view_reviews.php?id=[SQL], where [SQL]= -999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--

SQL Injection in SFS EZ Pub Site

A SQL injection vulnerability exists in SFS EZ Pub Site. An attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate the content of the database, disclose sensitive information, or even gain access to the underlying system.

SFS EZ WEBSTORE remote sql inj

A SQL injection vulnerability exists in the SearchResults.php file of SFS EZ WEBSTORE, which allows an attacker to execute arbitrary SQL commands via the 'where' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The following example shows a request containing a malicious SQL statement: http://localhost/script_path/SearchResults.php?SearchTerm=ZoRLu&where=[SQL]=ItemDescription+union+select+1,concat(user(),0x3a,database(),0x3a,version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16/*

SFS EZ Top Sites Remote sql Injection

A remote SQL injection vulnerability exists in SFS EZ Top Sites. The vulnerability is due to insufficient sanitization of user-supplied input to the 'ts' parameter in 'topsite.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow an attacker to gain access to sensitive information from the back-end database.

Recent Exploits: