header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Blog Pixel Motion Sql Injection Vulnerability

An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable application. An example of such a query is http://www.xxx.org/blog/index.php?categorie=-1+union+select+0,1,2,database(),4,5,6/*. Another example is http://localhost/[script_path]/index.php?categorie=-1+union+select+1,2,concat(login,0x3a,pass),4,5,6+from+blog_utilisateurs/*

MyBulletin Board (MyBB) Plugin “Custom Pages 1.0” – SQL Injection Vulnerability

MyBulletin Board (MyBB) Plugin "Custom Pages 1.0" is vulnerable to a SQL Injection vulnerability. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'page' GET parameter of the 'pages.php' script. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as username and password. The success rate of the attack depends on the permissions set for viewing the 'page' parameter.

Links Directory 1.1 SQL Injection Vulnerbilitys

Links directorys is vulnerable to a insecure sql query. An attacker can use a malicious URL to inject a SQL query into the vulnerable application. The URL contains a UNION statement that allows the attacker to load a local file on the vulnerable server. The hex inside the load_file() function is '/etc/passwd' in plaintext, however, some permissions are needed to use this function. The admin password is in the config.php file, and if the attacker can find the complete path, they can use load file to view the contents of the file and view the admin password.

VisualPic 0.3.1 Remote File Include

VisualPic 0.3.1 is vulnerable to a Remote File Include vulnerability. This vulnerability allows an attacker to include a remote file, usually through a malicious URL, containing arbitrary code which is then executed on the vulnerable server. The vulnerable code is located in the index.php file, where the include() function is used to include the file specified in the _CONFIG[files][functions_page] parameter.

Gaming Directory 1.0 SQL Injection Vulnerbilitys

This popular gaming directory script is vulnerable due to insecure mysql querys. This allows the remote attacker to pull info from the database. The below Injection uses MYSQL's load_file function, since the admin area password is stored in a config file we can use load_file to to try and locate it and display the contents of the file. Certain permissons to the running db user is required for this to work. In the load_file below is a string that has been converted to HEX and if you can read hex then its /etc/passwd so this should load the /etc/passwd file on most linux distros. Remember certain permissions are needed.

CoBaLT v1.0 Remote SQL Injection Vulnerability

CoBaLT v1.0 is vulnerable to remote SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. For example, an attacker can send the following URL to the vulnerable application: http://xxx.org/cobaltv1/urun.asp?id=24+union+select+0,1,sifre,3,kadi+from+yonetici. This will allow the attacker to access the database and extract sensitive information such as usernames and passwords.

Recent Exploits: