header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AJ Classifieds 2008 (index.php) Remote SQL Injection Vulnerability

AJ Classifieds 2008 (and possibly prior verisons) suffers from a insecure mysql query, This allows the remote attacker to arbitrary execute mysql code/querys. The below injection will perform a SELECT query which will display admin credentials in RED text.

Vortex CMS – Blind SQL Injection Exploit

Vortex CMS is vulnerable to Blind SQL Injection. This exploit allows an attacker to extract the username and password of a user from the database. The exploit works by sending a specially crafted HTTP request to the vulnerable server and then analyzing the response. The exploit is coded in PHP and requires the target URL, page ID and user ID as parameters.

Joomla Component com_datsogallery 1.6 Blind SQL Injection Exploit by +toxa+

This exploit is used to gain access to the Joomla Component com_datsogallery 1.6. It uses a blind SQL injection vulnerability to gain access to the password of the user. The exploit sends a malicious request to the server and checks the response for the password. It also checks the version of Joomla installed on the server.

ALM – Advanced Links Management remote SQL injection exploit

A remote SQL injection vulnerability exists in ALM - Advanced Links Management v1.5.2. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable script read.php, which can be used to extract sensitive information from the database, modify data, or execute system commands.

Phoenix View CMS <= Pre Alpha2 Multiple Vulnerabilities [LFI][SQLI][XSS]

Phoenix View CMS is going to be an easy to use Content-Managemen-System. It's using a self-written Template-Engine. The CMS will use a self-written API and it's gonna be easy to write your own plugins and modules. The vulnerability is caused by the lack of proper input validation in the admin/admin_frame.php and admin/module/*.php files, which allows an attacker to inject malicious code into the application. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application.

Recent Exploits: