header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SebracCMS

SebracCMS contains two major SQL injection vulnerabilities: Unsanitazed POST-variables in SQL queries when logging users in. This allows login access without proper credentials. And unsanitized GET-variables in SQL queries when loading articles. This allows an attacker to read all usernames and passwordhashes in the database. Using admin' OR '1'='1 as the username will allow login without proper registered credentials. The second and far more serious SQL Injection is in cms/form/read.php. This vulnerability allows an attacker to reveal all users and their md5-password hashes. Using 1' UNION ALL SELECT uname, uname, uname, pw, uname FROM sbc_user WHERE '1'='1 as the GET-variable 'recid' reveals the first post along with all registered users and their passwordhashes.

Joomla Component Xe webtv Blind SQL Injection Exploit

This exploit is used to gain access to the admin user of a Joomla Component Xe webtv. It uses a blind SQL injection vulnerability to exploit the system. The exploit takes the host, path, category value and valid tv id as arguments. It then sends a GET request to the host with the given path and the category and tv id as parameters. If the exploit is successful, it will return the admin user of the system.

Online Booking Manager2.2 (id=) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. The attacker can inject arbitrary SQL code into the vulnerable application, allowing them to access, modify, or delete data from the database.

Php fusion “classifieds” SQL-injetion

A remote SQL injection vulnerability exists in Php fusion classifieds. An attacker can exploit this vulnerability to inject malicious SQL queries into the application, allowing them to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input to the 'lid' parameter in the 'classifieds.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL queries to the vulnerable script. This can result in the execution of arbitrary SQL commands in the back-end database.

OTManager CMS v2.4 Insecure Cookie Handling Vulnerability

OTManager CMS suffers from insecure cookie handling, when a admin login is successful the script creates a cookie to show the rest of the admin area the user is already logged in. The bad thing is the cookie doesn't contain any password or anything alike, therefor we can craft a admin cookie and make it look like we are logged in as a legit admin.

philboard v 1.14 Multiple Remote Exploits

A remote SQL injection vulnerability exists in philboard v 1.14. An attacker can exploit this vulnerability to inject arbitrary SQL commands and execute them in the backend database. A remote XSS exploit also exists in philboard v 1.14. An attacker can exploit this vulnerability to inject arbitrary JavaScript code and execute it in the user's browser.

OTManager CMS (LFI/XSS) Multiple Remote Vulnerabilities

A vulnerability exists in OTManager CMS version 24a Completo, which allows an attacker to perform a Local File Inclusion (LFI) and Cross-Site Scripting (XSS) attack. The vulnerability is due to the application not properly sanitizing user-supplied input to the 'conteudo' parameter in the 'index.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to execute arbitrary code on the server, steal sensitive information, or perform other malicious actions.

Recent Exploits: