header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

runcms MyAnnonces SQL Injection(cid)

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to '/index.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. An example of vulnerable URL is 'XXXXMyAnnonces/index.php?pa=view&cid=[EXPLOiT]'. An attacker can exploit this vulnerability by sending a specially crafted request with malicious SQL code in 'cid' parameter.

PHP-Nuke Module Sections SQL Injection(artid)

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by appending the malicious SQL query to the vulnerable parameter in the HTTP request. This can allow an attacker to gain access to sensitive information stored in the database.

Xorg file disclosure vulnerability (CVE-2007-5958)

Xorg file disclosure vulnerability (CVE-2007-5958) is a vulnerability in Xorg server which allows an attacker to determine the existence of a file on the system. This vulnerability affects Xorg server versions <= 1.1.1-48.13. The exploit is written in shell script and it starts a second X server and then checks for the existence of the file specified in the argument. If the file exists, it prints “*** FILE $1 EXIST !! ***” else it prints “*** FILE $1 DOES NOT EXIST !! ***”.

Thecus N5200Pro NAS Server Control Panel Remote File Include

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'name' parameter of '/usr/usrgetform.html' script. A remote attacker can include arbitrary files from local resources and execute arbitrary PHP code on the vulnerable system.

SQL Injection in sCssBoard

The sCssBoard is vulnerable to SQL Injection due to improper sanitization of user-supplied input in the 'functions/post.php' file. An attacker can inject malicious SQL queries into the 'posts_main', 'posts_topic', 'posts_name', 'posts_body', 'posts_starter', 'posts_posted', and 'posts_forum' parameters of the 'insert into' statement, allowing them to execute arbitrary SQL commands on the underlying database.

PHP-Nuke Module books SQL Injection(file)

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'cid' parameter to '/modules.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Successful exploitation requires that 'magic_quotes_gpc' is disabled.

Recent Exploits: