header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Skype extension for Firefox BETA 2.2.0.95 Clipboard Writing Vulnerability PoC

A vulnerability in Skype extension for Firefox BETA 2.2.0.95 allows an attacker to write malicious content to the clipboard of the victim. This can be exploited by an attacker to execute arbitrary code on the victim's system by tricking the victim into pasting the malicious content into a vulnerable application.

asiCMS alpha 0.208 Multiple Remote File Inclusion Vulnerability

asiCMS alpha 0.208 is vulnerable to multiple remote file inclusion vulnerability. This vulnerability is caused due to the use of user-supplied input without proper validation. An attacker can exploit this vulnerability by sending malicious input to the vulnerable parameter _ENV[asicms][path] in the affected files. This can allow an attacker to execute arbitrary code on the vulnerable system.

PHP-Fusion Mod triscoop_race_system (raceid) Remote SQL Injection Vulnerability

A vulnerability exists in the PHP-Fusion Mod triscoop_race_system, which allows an attacker to inject malicious SQL commands into the raceid parameter of the race_details.php page. This can be exploited to gain access to sensitive information such as usernames and passwords.

PHP-Fusion Mod recept (kat_id) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in the PHP-Fusion Mod recept (kat_id) module. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames, passwords, and emails. The vulnerability is caused by improper sanitization of user-supplied input in the 'kat_id' parameter of the 'recept.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script.

PHP-Fusion Mod raidtracker_panel (INFO_RAID_ID) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in PHP-Fusion Mod raidtracker_panel. An attacker can exploit this vulnerability to inject malicious SQL queries into the application, allowing them to gain access to sensitive information such as usernames and passwords. The vulnerability is due to insufficient sanitization of user-supplied input to the 'INFO_RAID_ID' parameter in the 'thisraidprogress.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL queries to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.

fastpublish CMS SQL Injection and File Inclusion Vulnerabilities

fastpublish CMS version 1.9.9.9.9.d is vulnerable to SQL Injection and File Inclusion. An attacker can exploit this vulnerability by sending malicious SQL queries and file inclusion requests to the vulnerable application. The malicious SQL queries can be sent via the 'q' and 'sprache' parameters in the 'index2.php' script. The malicious file inclusion requests can be sent via the 'artikel' and 'target' parameters in the 'index2.php' and 'index.php' scripts.

Recent Exploits: