header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kolifa.Net Download Script (indir.php)

Kolifa.Net Download Script is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

z-breaknews 2.0 (single.php) Remote SQL Injection Vulnerability

z-breaknews 2.0 is vulnerable to a remote SQL injection vulnerability due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'single.php' script. An attacker can exploit this vulnerability to gain access to the database, extract sensitive information, and execute arbitrary SQL commands.

Crafty Syntax Live Help <= 2.14.6 SQL Injection

Crafty Syntax Live Help is a full featured, open source, online support system written in php that allows the visitors of a website to interact in real time with the site owners. There is a couple of high risk SQL Injections in Crafty Syntax Live Help that allows for an attacker to read arbitrary database contents such as user credentials, or administrator credentials. An updated version of Crafty Syntax Live Help is now available and users should upgrade as soon as possible. There is a high risk SQL Injection issue within Crafty Syntax Live Help that allows for an attacker to read arbitrary database contents such as user credentials, or administrator credentials. The vulnerable bit of code in question can be seen below. Since Crafty Syntax Live Help seems to store passwords in plain text by default, it is a trivial task for an attacker to gain administrative access to the installation after exploiting this issue.

html code to bypass the webinterface password protection of the Belkin wireless G router + adsl2 modem

This exploit allows an attacker to bypass the webinterface password protection of the Belkin wireless G router + adsl2 modem. It works by submitting a form with malicious values to the router's CGI script. This exploit was tested on model F5D7632-4V6 with upgraded firmware 6.01.08.

WebBoard <= 2.0 Arbitrary SQL Question/Anwser Delete Vulnerability

WebBoard suffers from remote vulnerabilitys, included in this writeup is a method to arbitrary delete the questions and anwsers from the board. its also possible to execute sql querys once you have found a vulnerable website (shouldnt be hard from 2k+ vuln sites) modify the url below to include the victim sites domain, and change the <NUM> tags to a valid question/anwser number execute the url, and the question and anwsers will be deleted. you can also use SQL injection in replace of the <NUM> tags use load_file() to view the config file for username and passwords.

DSECRG-08-037

Pluck CMS has Multiple Local File Include vulnerabilities. Vulnerable GET parameters 'blogpost', 'cat' and 'file'. First discovered by AmnPardaz Security Research Team. Vendor fixed vulnerability in version 4.5.2 by blocking directly access to this file. However, attacker still can exploit this vulnerability from index.php file.

Web Directory Script <= 2.0 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'name' parameter to '/listing_view.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information stored in the database, modify data, compromise the system, etc.

Market SQL Injection

The vulnerability exists due to insufficient sanitization of user-supplied input in 'category' and 'type' parameters of 'index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information stored in the database.

Recent Exploits: