header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MyCard script 1.0.2 (gallery.php?id) SQL Injection

MyCard script version 1.0.2 is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'gallery.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable script. This will allow the attacker to gain access to the database and extract sensitive information.

LnBlog <= 0.9.0 Local File Inclusion Vulnerability

LnBlog is a cross-platform, file-based weblog/mini-CMS. A vulnerability exists in the showblog.php file of the LnBlog 0.9.0 version, which allows an attacker to include arbitrary local files via the 'plugin' parameter. This can be exploited to disclose sensitive information, such as the /etc/passwd file.

The Concord Asset, Software, and Ticket system(CoAST) 0.95 Remote File Inclusion Vulnerability

The header.php.dist file exists and it has to be renamed into header.php as given in instructions. The vulnerability lies in line 201 of the header.php file, which includes the $sections_file variable without any sanitization.

E-Uploader Pro <= 1.0 SQL Injection Vulnerability

E-Uploader Pro version 1.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by sending a specially crafted HTTP request to the vulnerable application. The vulnerable application is vulnerable to both union-based and error-based SQL injection. The vulnerable application is also vulnerable to blind SQL injection. The vulnerable application is vulnerable to both GET and POST requests. The vulnerable application is vulnerable to both authenticated and unauthenticated users.

Joovili <= 3.0 SQL Injection Vulnerability

Joovili version 3.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable URL parameters. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.

Vbgooglemap Hotspot Edition 1.0.3 Remote SQL Injection Vulnerability

Vbgooglemap Hotspot Edition 1.0.3 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This request contains malicious SQL statements that are executed in the backend database. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.

X7 Chat <= 2.0.1A1 Local File Inclusion Vulnerability

X7 Chat version 2.0.5.1 is vulnerable to a Local File Inclusion vulnerability. This vulnerability is due to the application failing to properly sanitize user-supplied input to the 'help_file' parameter of the 'help/mini.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal characters to the vulnerable script. This can allow the attacker to include arbitrary local files from the web server, resulting in the disclosure of sensitive information.

Recent Exploits: