header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHPMyCart Injection Vulnerability

Script suffers from a not correctly verified category id variable which is used in SQL Querys. An Attacker can easily get sensitive information from the database by injecting unexpected SQL Querys. We dont get any SQL Errors when the Injection Query appear to be false. However we have to look for content changing when we inject. Look at AND 1=1/AND 1=0 All rows are echoed on the left side.

Family Connections CMS 1.4 Multiple Remote SQL Injection Vulnerabilities

Family Connections CMS version 1.4 is vulnerable to multiple remote SQL injection vulnerabilities. An attacker can exploit these vulnerabilities to gain access to sensitive information such as usernames and passwords. The vulnerabilities exist in the addressbook.php, familynews.php and home.php scripts. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable scripts to exploit these vulnerabilities.

Contenido

Multiple Remote File Inclusion (RFI) and Cross-Site Scripting (XSS) vulnerabilities in Contenido 4.8.4 and possibly earlier versions allow remote attackers to execute arbitrary code and steal cookie-based authentication credentials via a URL in the contenido_path parameter to backend_search.php, the cfg[path][contenido] parameter to move_articles.php, move_old_stats.php, optimize_database.php, run_newsletter_job.php, send_reminder.php, session_cleanup.php, and setfrontenduserstate.php, the cfg[path][templates] parameter to include.newsletter_jobs_subnav.php and include.right_top.php, and the c[path][templates] parameter to include.newsletter_jobs_subnav.php and include.right_top.php, and a malicious script in the changelang parameter to front_content.php.

Pre Job Board (JobSearch.php) Remote SQL Injection Vulnerability

A vulnerability exists in the JobSearch.php file of the Pre Job Board software, which allows a remote attacker to inject arbitrary SQL commands. The vulnerability is due to insufficient sanitization of user-supplied input to the 'search' parameter when passed to the 'JobSearch.php' script. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mambo <= 4.6.4 Remote File Inclusion Vulnerability

Mambo version 4.6.4 and earlier is vulnerable to a remote file inclusion vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'mosConfig_absolute_path' parameter of the '/includes/Cache/Lite/Output.php' script. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system in the context of the webserver process.

PHP JOBWEBSITE PRO (JobSearch3.php) Remote SQL Injection Vulnerability

The vulnerability exists in the 'JobSearch3.php' file of the PHP JOBWEBSITE PRO payment software. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter. This can allow the attacker to gain access to the database and execute arbitrary code.

E-SMART CART (productsofcat.asp) Remote SQL Injection Vulnerability

A vulnerability exists in E-SMART CART (payment) software, where a remote attacker can inject arbitrary SQL commands via the 'category_id' parameter in the 'productsofcat.asp' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

ECHO_ADV_97$2008 Pre News Manager <= 1.0 (index.php id) Sql Injection Vulnerability

Input passed to the 'id' parameter in index.php page is not properly verified before being used to sql query. This can be exploited thru the browser and get password from admin in plain text. Successful exploitation requires that 'm_id' parameter is set to '1'.

Recent Exploits: