header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebEdition CMS – Blind SQL Injection Exploit

WebEdition CMS is vulnerable to Blind SQL Injection. This exploit allows an attacker to extract the username and password of a user from the database. The vulnerability is due to the lack of proper input validation in the 'we_objectID' parameter. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This will allow the attacker to extract the username and password of a user from the database.

phpBazar SQL Injection Vulnerability all versions

A SQL injection vulnerability exists in phpBazar, which allows an attacker to execute arbitrary SQL commands via the 'catid', 'subcatid', and 'adid' parameters in a 'classified.php' script. An attacker can use this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerability is present in all versions of phpBazar.

Anzio Web Print Object Buffer Overflow

Anzio Web Print Object (WePO) is a Windows ActiveX web page component that, when placed on a web page can 'push' a print job from a file or web server to a user's local printer without having to display the HTML equivalent to that user. By placing WePO code on a web page, you can provide a method whereby the viewer of that web page can request a local print of a host resident print job, archived print job or a report stream through a server-side script request. Anzio Web Print Object is vulnerable to a buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious web page with a long 'mainurl' parameter for the WePO ActiveX component.

Bookmarks V 1.1.02 (id) Remote SQL Injection Vulnerability

A vulnerability exists in Active PHP Bookmarks v1.1.02, which allows an attacker to inject arbitrary SQL commands via the 'id' parameter in view_group.php. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary commands.

Banner Management Script (tr.php id) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The attacker can inject arbitrary SQL code in the vulnerable parameter 'id' of the 'tr.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. This can be exploited to disclose the content of the database, modify data, execute administration operations and potentially compromise the system.

SunShop <= 4.1.4 SQL Injection

SunShop shopping cart is a full featured ecommerce solution written in php that allows for web masters to run their own online ecommerce operation. Unfortunately there are a number of SQL Injection issues in SunShop that allow for an attacker to have arbitrary access to the SunShop database where they can access information such as customer and administrator details.

Ad Board (trr.php id) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in Ad Board, which is a web-based advertisement board. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This request contains a specially crafted SQL query that can be used to extract sensitive information from the database, such as usernames and passwords. The vulnerable parameter is the 'id' parameter in the 'trr.php' script. An example exploit is www.[target].com/Script/trr.php?id=-91+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11+from+adminsettings--

Affiliate Directory (id) Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable script. The vulnerable parameter is ‘id’ which is not properly sanitized before being used in an SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information.

Recent Exploits: