header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

miniBloggie 1.0 (del.php) Remote Blind SQL Injection Exploit

miniBloggie 1.0 is vulnerable to a remote blind SQL injection vulnerability due to the lack of sanitization of the 'post_id' parameter in the 'del.php' file. An attacker can exploit this vulnerability to execute arbitrary SQL code on the vulnerable application's database.

MRBS Blind SQL Injection Vulnerability

A Blind SQL Injection vulnerability was discovered in the Meeting Room Booking System (MRBS) which allows an attacker to inject malicious SQL queries into the application. The vulnerability exists in the ‘month.php’, ‘day.php’ and ‘week.php’ scripts, which are vulnerable to a Blind SQL Injection attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable scripts with a malicious SQL query. This can allow the attacker to gain access to sensitive information from the database.

zeeproperty (adid) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The malicious request contains a specially crafted SQL query that can be used to extract sensitive information from the database. The malicious request can be sent to the vulnerable application using the 'adid' parameter in the 'bannerclick.php' script.

WordPress stnl_iframe remote sql injection vulnerability

A remote SQL injection vulnerability exists in the WordPress plugin stnl_iframe.php. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames, passwords, and emails. The vulnerability is due to insufficient sanitization of user-supplied input to the 'newsletter' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This will allow the attacker to gain access to the database and extract sensitive information.

Hummingbird Deployment Wizard 2008 (DeployRun.dll) Arbitrary File Execution(2)

Hummingbird Deployment Wizard 2008 (DeployRun.dll) is vulnerable to arbitrary file execution. The vulnerable method is PerformUpdateAsync (ByVal ExecAfterComplete As String). It has been tested on Windows XP Professional SP3 full patched, with Internet Explorer 7.

Solaris 9 PortBind XDR-DECODE taddr2uaddr() Remote DoS

A denial of service vulnerability exists in Solaris 9 due to a flaw in the taddr2uaddr() function of the Portmapper RPC service. By sending a specially crafted XDR-DECODE request, a remote attacker can cause a segmentation fault in the service, resulting in a denial of service.

Hummingbird Deployment Wizard 2008 (DeployRun.dll) Registry Values Creation/Change

Hummingbird Deployment Wizard 2008 (DeployRun.dll) is vulnerable to registry values creation/change. The vulnerable method is Sub SetRegistryValueAsString (ByVal Path As String, ByVal v As String). This exploit was tested on Windows XP Professional SP3 full patched, with Internet Explorer 7.

Recent Exploits: