header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ovidentia 6.6.5 Sql Injection

A SQL injection vulnerability exists in Ovidentia 6.6.5, which allows an attacker to execute arbitrary SQL commands via the 'idx' parameter in a 'index.php' script. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords.

Ppim <= 1.0 (upload/change password) Multiple Vulnerabilities

Ppim v1.0 has two vulnerabilities, one is related to change password and other is related to upload. For change password, the user can go to the link http://localhost/ppim/changepassword.php and write their password and confirm it. For upload, the user can go to the link http://localhost/ppim/upload.php and upload a php shell. After that, they can go to http://localhost/ppim/shell.php to access the uploaded shell.

ZeeBuddy v2.1(adid) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in ZeeBuddy v2.1(adid). An attacker can send a specially crafted HTTP request to the vulnerable script bannerclick.php with the parameter adid to execute arbitrary SQL commands and gain access to sensitive information in the back-end database. The vulnerable script is located at http://www.zeescripts.com.

psipuss version 1.0 SQL Injection Vulnerabilities

An attacker can exploit this vulnerability by sending a crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, modify data, or execute system level commands.

PHP-Ring Webring System v0.9.1 Insecure Cookie Handling Vulnerability

PHP-Ring Webring System suffers from insecure cookie handling, when a admin login is successful the script creates a cookie to show the rest of the admin area the user is already logged in. The bad thing is the cookie doesn't contain any password or anything alike, therefor we can craft a admin cookie and make it look like we are logged in as a legit admin.

Quicksilver Forums 1.4.1 (forums[]) Remote SQL Injection Exploit

This is a proof-of-concept exploit for a remote SQL injection vulnerability in Quicksilver Forums 1.4.1. The exploit sends a malicious POST request to the vulnerable application, which then returns the username and password of the first user in the database. The exploit is written in PHP and requires the host and path of the vulnerable application as parameters.

e107 <= 0.7.11 Arbitrary Variable Overwriting

e107 is a popular full featured content management system written in php. Unfortunately e107 suffers from an arbitrary variable overwriting issue within it's download.php file that allows a number of possible attacks to happen including, but possibly not limited to, arbitrary php code execution and SQL Injection. No authentication is required to exploit the issue and it can be exploited regardless of php magic quotes settings.

Recent Exploits: