header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebBiscuits Modules Controller <= 1.1 (RFI/RFD) Multiple Remote Vulnerabilities

WebBiscuits Modules Controller version 1.1 is vulnerable to Remote File Inclusion and Remote File Disclosure. An attacker can exploit this vulnerability to include arbitrary files from remote locations and disclose sensitive information from the server.

Textlinksads Exploit

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'idcat' parameter of the 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel or to steal sensitive information from the database.

DFF PHP Framework API (Data Feed File) Multiple Inclusion Vulnerabilities

DFF PHP Framework API (Data Feed File) is vulnerable to multiple inclusion vulnerabilities. An attacker can exploit these vulnerabilities by sending a crafted request to the vulnerable script with the DFF_config[dir_include] parameter set to a malicious file. This can allow the attacker to execute arbitrary code on the vulnerable system.

Microsoft PicturePusher ActiveX (PipPPush.DLL 7.00.0709) remote Cross Site File Upload attack POC (IE6)

This control allows to build highly customized POST requests against private upload facilities, using the browser as a proxy to bounce them and by injecting a filename sub-field through ex. the AddString() method.

TorrentTrader Classic <= 1.04 Blind SQL Injection Exploit

A Blind SQL Injection vulnerability exists in TorrentTrader Classic version 1.04. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'completed-advance.php' script. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database.

Built2Go PHP RealEstate v1.5 (event_detail.php) – SQL Injection Vulnerability

A vulnerability exists in Built2Go PHP RealEstate v1.5, which allows an attacker to inject arbitrary SQL commands via the 'event_id' parameter in 'event_detail.php'. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords.

Yourownbux v4.0 Blind SQL Injection Vulnerability ( referrals.php )

Yourownbux v4.0 is vulnerable to Blind SQL Injection. An attacker can inject malicious SQL queries via the 'usNick' cookie parameter in the 'referrals.php' page. An attacker can use this vulnerability to extract sensitive information from the database such as user passwords.

Recent Exploits: