header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

212cafe Board (view.php qID) Remote SQL Injection Vulnerability

A vulnerability exists in the view.php file of the 212cafe Board application, version 0.07, which allows an attacker to inject arbitrary SQL commands. The vulnerability is due to the application not properly sanitizing user-supplied input to the 'qID' parameter. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing an SQL injection payload to the vulnerable application. Successful exploitation could result in the attacker gaining access to sensitive information from the database.

PromoteWeb MySQL (go.php id) Remote SQL Injection Vulnerability

A vulnerability exists in PromoteWeb MySQL, which allows an attacker to inject arbitrary SQL commands via the 'id' parameter in the 'go.php' script. Magic Quote must be turned off for the exploit to work. The exploit can be triggered by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable server. The result of the SQL injection will appear in a new window with the URL http://[result]/.

Ultimate Webboard (webboard.php Category) Remote SQL Injection Vulnerability

A vulnerability exists in Ultimate Webboard 3.00, where a remote attacker can inject arbitrary SQL commands via the 'Category' parameter in the 'webboard.php' script. Magic Quote must be turned off for the attack to be successful. An example exploit URL is http://[Target]/[webboard]/webboard.php?Category=general'/**/UNION/**/SELECT/**/1,concat(user,0x3a3a,password),3,4,5,6,7,8/**/FROM/**/mysql.user/**/where/**/user='root

barcodegen <= 2.0.0 Remote File Inclusion Vulnerability

In File : LSTable.php In Line 21 : include( $class_dir.'/Table_template.php' ); An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious URL in the class_dir parameter. This URL can point to a malicious file hosted on a third-party server, which will be included and executed on the vulnerable server.

Atomic Photo Album 1.1.0pre4 – Blind SQL Injection Exploit

Atomic Photo Album 1.1.0pre4 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'apa_album_ID' parameter of the 'lalbum.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This will allow the attacker to execute arbitrary SQL commands in the context of the application's database.

LanSuite 3.3.2 (fckeditor) Arbitrary File Upload

LanSuite 3.3.2 is vulnerable to an arbitrary file upload vulnerability. This vulnerability allows an attacker to upload a malicious file to the server, which can be used to execute arbitrary code. The vulnerability exists due to insufficient validation of the uploaded file. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious file to the vulnerable server.

Atomic Photo Album 1.1.0pre4 [album.php] – Multiple Remote Vulnerabilities

Atomic Photo Album 1.1.0pre4 is vulnerable to SQL Injection and XSS attacks. An attacker can inject malicious SQL queries to gain access to the database and execute arbitrary code on the vulnerable system. An attacker can also inject malicious JavaScript code to gain access to the vulnerable system.

openEngine <= 2.0 beta4 Remote File Inclusion Vulnerability

Open Source Web Content Management Systems openEngine version 2.0 beta4 is vulnerable to a Remote File Inclusion vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, and execute it on the vulnerable server. The vulnerable code is located in the openengine.php file, which is included in the openEngine20 directory. The vulnerable code is the require() function, which is used to include the mysql.php file from the openengine/database directory. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable server, which will include and execute the malicious file.

ICONICS Vessel / Gauge / Switch 8.02.140 ActiveX DoModal Overflow

This module exploits a stack overflow in the Iconics Vessel / Gauge / Switch ActiveX controls. It is triggered when a maliciously crafted web page is loaded in Internet Explorer, which causes a buffer overflow in the DoModal() method of the vulnerable ActiveX control. This can result in arbitrary code execution.

Recent Exploits: