header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BackLinkSpider (cat_id) Blind Sql Injection Vulnerability

Input passed to the 'cat_id' parameter in backlinkspider's page is not properly verified before being used to sql query. This can be exploited to execute sql query through the browser. Successful exploitation requires that 'magic_quotes' is enabled.

ECHO_ADV_91$2008

Online Rental Property Script version 4.5 and prior are prone to a blind SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue allows an attacker to manipulate SQL queries by injecting arbitrary data. This can be exploited to manipulate or disclose arbitrary data in the back-end database.

ECHO_ADV_90$2008 PostNuke Module pnEncyclopedia <= 0.2.0 (id) Blind Sql Injection Vulnerability

Input passed to the 'id' parameter is not properly verified before being used to sql query. This can be exploited thru the browser and get the username and hash md5 password from users. Successful exploitation requires that 'magic_quotes' is off.

Scout Portal Toolkit <= 1.4.0 (ParentId) Remote SQL Injection Exploit

Scout Portal Toolkit version 1.4.0 and prior are vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application.

cpLinks v1.03 Multiple Vulnerabilities (bypass/SQL/XXS)

cpLinks v1.03 is vulnerable to bypass, SQL and XSS injection. An attacker can bypass the authentication by entering ' or 1=1 /* in the username field and can inject malicious SQL and XSS payloads in the search_category and search_text parameters of the search.php page.

SQL Injection and Bypass Administrator Login

SQL Injection vulnerability exists in phpDirectorySource 1.1 which allows an attacker to bypass administrator login and extract sensitive information from the database. The vulnerability is due to improper sanitization of user-supplied input in the 'lid' parameter of the 'show.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script with malicious SQL statements in the 'lid' parameter. This will allow the attacker to bypass administrator login and extract sensitive information from the database.

HLDS WebMod 0.48 (rconpass) Remote Heap Overflow Exploit

This exploit is a remote heap overflow vulnerability in HLDS WebMod 0.48. It was tested on HLDS Launcher 4.1.1.1, WebMod 0.48, and Windows XP SP2 Hebrew. The exploit is triggered by sending a specially crafted packet to the server. The packet contains a shellcode that is executed when the exploit is successful.

Recent Exploits: