header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NonameCMS SQL Injection Vulnerability

NonameCMS is vulnerable to SQL injection. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'file_id' and 'kategorie' parameters of 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information, modify data, or exploit vulnerabilities in the underlying database implementation.

Discussion Forums 2k SQL Injection

The Discussion Forums 2k application is vulnerable to multiple SQL injection attacks when magic_quotes_gpc is set to Off. An attacker can exploit this vulnerability by sending malicious SQL queries to the application. The malicious queries can be sent via the 'CatID', 'id', and 'SubID' parameters in the 'RSS1.php', 'RSS2.php', and 'RSS5.php' scripts respectively.

MySQL Quick Admin <= 1.5.5 (COOKIE) Local File Inclusion Vulnerability

MySQL Quick Admin version 1.5.5 and below is vulnerable to a Local File Inclusion vulnerability. This vulnerability is due to the application not properly sanitizing user-supplied input in the 'language' cookie. An attacker can exploit this vulnerability to include arbitrary files from the web server, such as the web server's '/etc/passwd' file, resulting in the disclosure of sensitive information. To exploit this vulnerability, an attacker must set the 'language' cookie to a malicious value, such as '../../../../../../../../../../etc/passwd%00; path=/', and then enter '/index.php' in the browser.

ADN Forum <= 1.0b Blind SQL Injection Exploit

This exploit is used to gain access to the MD5 hash of the password of the user with ID 1 in the ADN Forum version 1.0b. It uses a blind SQL injection vulnerability to achieve this. The exploit is written in Perl and uses the LWP::UserAgent module to send requests to the server. It then iterates through a list of characters and sends requests with the ascii value of the character in the query. If the response is successful, it adds the character to the MD5 hash and moves on to the next character.

Printlog <= 0.4: Remote File Edition Vulnerability

You can navigate and see the entries. Something like as: http://localhost/p/index.php?option=viewEntry&filename=00001. Code doesn't check the comments directory. If magic quotes are off you can do: http://localhost/p/index.php?option=viewEntry&filename=../config.php%00. config.php has the admin password.

GdPicture Pro ActiveX (gdpicture4s.ocx) Remote File Overwrite / Execution Exploit

The SaveAsPDF() method of GdPicture Pro ActiveX (gdpicture4s.ocx) allows to create / overwrite file through sFilePath argument. By using other arguments, such as sTitle, an attacker could be inject html code and execute it using the hcp:// protocol (tecnique discovered by rgod). Tested on Windows XP SP2 with IE 6/7.

BookMarks Favourites Script (view_group.php id) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in the BookMarks Favourites Script. An attacker can exploit this vulnerability to inject malicious SQL queries into the application, allowing them to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input to the 'id' parameter in the 'view_group.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL queries to the vulnerable script. This can result in the execution of arbitrary SQL commands, allowing the attacker to gain access to sensitive information stored in the database.

Rianxosencabos CMS 0.9 Remote Blind SQL Injection Vulnerability

Rianxosencabos CMS 0.9 is vulnerable to a Remote Blind SQL Injection vulnerability. This vulnerability is due to the 'scripts/links.php' script not properly sanitizing user-supplied input to the 'id' parameter in the 'visita()' function. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database, allowing for the manipulation or disclosure of arbitrary data. This vulnerability can be exploited through a browser.

SG Real Estate Portal 2.0 Insecure Cookie Handling Vulnerability

SG Real Estate Portal 2.0 is prone to an insecure cookie handling vulnerability. This issue is due to a failure in the application to properly validate user-supplied input. An attacker can exploit this issue to gain unauthorized access to the application.

Recent Exploits: