header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Reciprocal Links Manager 1.1 (site) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The crafted request contains malicious SQL statements that are executed in the backend database. This can allow an attacker to gain access to sensitive information such as usernames, passwords, and other sensitive data stored in the database.

Coupon Script 4.0 (id) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The crafted request contains malicious SQL statements in the 'id' parameter of the 'addtocart' page. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.

SQL Injection vulnerability in myPHPNuke

There is SQL Injection vulnerability in printfeature.php in myPHPNuke. With this query you will receive login and password (hash) of administrator. Vulnerable versions are myPHPNuke < 1.8.8_8rc2. In last version the additional filters were added, so it is not vulnerable to this attack. But version 1.8.8_8rc2 is still vulnerable to SQL Injection and so limited SQL Injection attack is possible (without using spaces and brackets).

e107 Plugin BLOG Engine v2.2 SQL Injection Exploit

This exploit allows an attacker to gain access to the admin credentials of the e107 Plugin BLOG Engine v2.2. The exploit is done by sending a malicious HTTP request to the vulnerable website, which contains a SQL injection payload. The payload is designed to extract the admin username and password from the e107_user table. The exploit was discovered by the Virangar Security Team in 2009.

CMSbright SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in CMSbright to execute arbitrary SQL commands on the underlying database. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'id_rub_page' parameter of the 'public/page.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information stored in the database, modification of data, and even execution of arbitrary system commands on the server.

Recent Exploits: