header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JAMM CMS (id) Blind SQL Injection Vulnerability

JAMM CMS is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to the database and extract sensitive information.

Pooya Site Builder (PSB) SQL Injection Vulnerabilities

Pooya site builder (psb) is an easy to use database driven web content management and security management system. It allows you to create, edit & web content instantly using just a browser, psb provides all essential feature you need for running your own business websites (you can even use it for large websites, without the complexity of unused functions). SQL Injection in "/utils/getXsl.aspx" in "xslIdn" parameter, "/utils/getXml.aspx" in "part" parameter and "/utils/getXls.aspx" in "part" parameter. Use Internet Explorer (IE) for best result. ' used to bypass any SQL Injection denier.

MycroCMS 0.5 Remote Blind SQL Injection Vulnerability

MycroCMS 0.5 is vulnerable to a Remote Blind SQL Injection vulnerability. This vulnerability can be exploited by an attacker to gain access to the database and extract sensitive information. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'entry_id' parameter. An attacker can send a malicious SQL query to the vulnerable parameter and gain access to the database. The exploit requires the 'magic_quotes_gpc' to be disabled.

IPTBB 0.5.6 Arbitrary Add-Admin Exploit

IPTBB 0.5.6 have Vulnerability to escalate user's privilege to administartor's privilege. That Vulnerable in 'User Control Panel - Change Email' (http://[Target]/[iptbb_path]/index.php?act=usercp&p=email) and you can injection code into form,This action will give your account can use Admin Control Panel (http://[Target]/[iptbb_path]/admincp.php) with Administrative's Privilege.

rEm0te SQL InjEcti0n VulnErability

eFiction 3.0 is prone to a remote SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects the 'toplists.php' script when 'list' parameter is supplied. An attacker can exploit this issue to manipulate SQL queries and gain access to unauthorized information. This issue affects the 'toplists.php' script when 'list' parameter is supplied.

FOG Forum 0.8.1 Local File Inclusion Vulnerabilities

FOG Forum 0.8.1 is vulnerable to Local File Inclusion (LFI) attacks. An attacker can exploit this vulnerability by sending maliciously crafted POST requests to the vulnerable application. The attacker can use a web proxy such as WebScarab to intercept and edit the POST request data. The vulnerable files/paths are http://[Target]/[Path]/index.php. The attacker can send maliciously crafted POST requests with the parameters fog_skin, fog_lang, fog_pseudo, fog_password, fog_cook, fog_action, fog_userid, fog_path, fog_posted, fog_pseudo, fog_password, and fog_cook. This will allow the attacker to read local files such as boot.ini.

TNT Forum 0.9.4 Local File Inclusion Vulnerabilities

An attacker can exploit this vulnerability by sending a crafted HTTP request with a maliciously crafted 'modulo' parameter. For Windows, the attacker can send a request like http://[Target]/[tntforum_path]/index.php?modulo=../../../../../../../../boot.ini%00 and for Linux, the attacker can send a request like http://localhost/tntforum/index.php?modulo=../../../../../../../../etc/passwd%00

Recent Exploits: