header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CMS MAXSITE Remote SQL Injection Exploit <= 1.10

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'name' and 'category' parameters of the 'index.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows an attacker to gain access to the vulnerable system.

RoomPHPlanning 1.5 SQL Injection Vulnerabilities

RoomPHPlanning 1.5 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

plusPHP Multi-User Short URL and Statistics (plus.php) RFI Vulnerability

plusPHP Multi-User Short URL and Statistics (plus.php) is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process.

PhpRaider Mod phpbb3 Remote File Include Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'pConfig_auth[phpbb_path]' parameter to '/path/authentication/phpbb3/phpbb3.functions.php' script. A remote attacker can include arbitrary files from remote hosts and execute arbitrary PHP code on the vulnerable system.

RoomPHPlanning v1.5 remote SQL injection exploit

RoomPHPlanning v1.5 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.

DSECRG-08-030

Quate CMS system has multiple security vulnerabilities: 1. Multiple Remote/Local File Include, 2. Multiple Linked XSS vulnerabilities, 3. Directory traversal. Quate CMS has Multiple Local File Include vulnerabilities. Local File Include vulnerability found in script admin/includes/footer.php. Remote and Local File Include vulnerability found in script admin/includes/header.php. Multiple Linked XSS vulnerabilities found in script admin/includes/header.php. Directory traversal vulnerability found in script admin/includes/header.php.

VLC 0.8.6d Double Sh311 Universal Exploit

VLC 0.8.6d is vulnerable to a double sh311 universal exploit. This exploit allows an attacker to gain remote code execution on the vulnerable system. The vulnerability was discovered by Michal Luczaj and was coded by Muris Kurgas and Matteo Memelli. The exploit uses a win32_bind shellcode to gain remote code execution.

e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability

The vulnerability exists in the macgurublog.php file, where the user_id parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow an attacker to gain access to sensitive information from the database, such as user credentials.

Recent Exploits: