header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Questcms Multiple Remote Vulnerabilities [XSS/Directory Traversal/sql]

A vulnerability exists in Questwork Web Content Management system (QuestCMS) which allows an attacker to perform Directory Traversal, SQL Injection and XSS attacks. The Directory Traversal vulnerability exists in the 'theme' parameter of the 'main.php' script, which allows an attacker to read arbitrary files on the server. The SQL Injection vulnerability exists in the 'obj' parameter of the 'main.php' script, which allows an attacker to execute arbitrary SQL queries. The XSS vulnerability exists in the 'cx' parameter of the 'main.php' script, which allows an attacker to inject arbitrary web script or HTML.

e107 (Plugin EasyShop) Remote Blind SQL Injection Exploit

This exploit is used to gain access to the user_password from the e107_user table in the database of the e107 CMS. The exploit uses a blind SQL injection vulnerability in the Plugin EasyShop to gain access to the user_password. The exploit is written in Perl and uses the LWP::UserAgent module to send requests to the vulnerable URL.

Linux kernel < 2.6.22 open/ftruncate local exploit

This exploit allows a local user to gain root privileges by exploiting a vulnerability in the open/ftruncate system call. The vulnerability is present in Linux kernel versions prior to 2.6.22. The exploit works by creating a file with the setgid bit set, and then using the open/ftruncate system call to overwrite the file with malicious code. The malicious code is then executed with root privileges.

e107 Plugin alternate_profiles (newuser.php?id) Remote SQL-injetion Vulnerability

A remote SQL-injection vulnerability exists in the e107 Plugin alternate_profiles (newuser.php?id). An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information, modification of data, and other malicious activities.

Persia BME E-Catalogue SQL Injection Vulnerability

Input passed to the 'q' parameter in 'search.aspx' is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Its possible to obtain user's plain text password by this vulnerability.

Adspro Script Remote Command Execution

Adspro is prone to a remote command-execution vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary commands in the context of the webserver process. Successful exploits will result in the complete compromise of the affected computer.

Local File Inclusion Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can specify a malicious file in the ‘padmin’ parameter of the vulnerable application, which will be included in the application’s response. This can allow the attacker to execute arbitrary code on the vulnerable system.

MyForum 1.3 Remote SQL Exploit

MyForum 1.3 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the admin or user login credentials. The exploit code sends a malicious HTTP request to the vulnerable server with the SQL injection payload appended to the URL. If the exploit is successful, the attacker can gain access to the admin or user login credentials.

SFS Forum (forum.php id) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in SFS Forum (forum.php id). An attacker can exploit this vulnerability to gain access to sensitive information such as usernames, passwords, and emails. The vulnerability is due to improper sanitization of user-supplied input to the 'forum' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database.

Recent Exploits: