header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpWebNews v0.2 MySQL Edition (Surat kabar/News Management Online) SQL Injection

Here, we have a classic SQL MySQL injection. The GET variable 'id_kat' isn't sanitized before being passed to the query. By injecting our string, the query becomes: select * from berita where status='tampil' and kode_kategori=null UNION ALL SELECT 1,2,3,4,concat(user,0x3a,passwd),6,7,8,9,10,11,12,13 FROM user-- and isi_berita like %'$m_txt'% order by tgl desc. The comment renders the rest of the query to be useless. We are effectively grabbing the first user from the table 'user', which is the admin. You can inject the other strings with server variables and attempt to fetch mysql.user hashes, if the conditions apply.

CMS WebBlizzard Blind SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL queries into a vulnerable web application. The exploit is a blind SQL injection, meaning that the attacker can not see the results of the query, but can determine if the query was successful or not. The exploit is used to gain access to the database and extract sensitive information such as usernames and passwords.

Joomla Component is v 1.0.1 Multiple Remote SQL Injection

A vulnerability in Joomla Component is v 1.0.1 allows an attacker to perform a remote SQL injection attack. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'marka' and 'motor' parameters of the 'index.php' script. A remote attacker can execute arbitrary SQL commands in the application database, gain access to sensitive data, modify data, and compromise the application and the underlying system.

Joomla Component QuickTime VR v 0.1 Remote SQL Injection

A remote SQL injection vulnerability exists in Joomla Component QuickTime VR v 0.1. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The vulnerability is due to improper sanitization of user-supplied input in the 'room_id' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can allow an attacker to gain access to the admin panel of the application.

Joomla Component Brightcode Weblinks Remote SQL injection

A vulnerability in Joomla Component Brightcode Weblinks allows an attacker to execute arbitrary SQL commands via the 'catid' parameter in a 'index.php' call. An attacker can use the 'UNION SELECT' SQL injection technique to extract data from the database, including sensitive information such as usernames and passwords.

CMS little (index.php template) Local File Inclusion Vulnerability

A Local File Inclusion (LFI) vulnerability exists in CMS little 0.0.1. An attacker can exploit this vulnerability to include arbitrary files from the local system, such as boot.ini or /etc/passwd, by sending a specially crafted HTTP request to the vulnerable application. This can be done by sending a request to the vulnerable index.php file with the template parameter set to a relative path of the file to be included.

xchangeboard 1.70 final and lower

xchangeboard 1.70 final and lower is vulnerable to an SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to user credentials like passwords which are saved as cookies. The PoC for this exploit is http://site.com/path/newThread.php?boardID=+999999%20union%20select%20email,concat_ws(0x3a,nick,substring(password,1,100)),email,email,email%20from%20user/*

Recent Exploits: