header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress album PHOTO SQL Injection

An attacker can exploit a SQL injection vulnerability in WordPress album PHOTO to gain access to the user login and password of the admin user. The exploit is achieved by sending a specially crafted HTTP request containing malicious SQL code to the vulnerable application. The malicious code is sent in the 'photo' parameter of the vulnerable page.

joomla SQL Injection(com_galeria)

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The crafted request contains malicious SQL statements that are executed in the backend database. This can allow an attacker to access sensitive information from the database, modify or delete data, or even execute system commands.

Simple CMS <= 1.0.3 (?area=) Remote SQL Injection Exploit

Simple CMS version 1.0.3 and prior are vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. This exploit uses a union select statement to extract the information from the cpanel_authors table.

AuraCMS 1.62 Multiple Remote SQL Injection Exploit

AuraCMS 1.62 is vulnerable to multiple remote SQL injection attacks due to the lack of input validation in the 'dl.php' and 'links.php' files. If the 'magic_quotes_gpc' setting is disabled on the server, an attacker can manipulate the SQL statement in the 'kid' variable. For example, an attacker can send a request to 'http://site.korban/auracms162/index.php?pilih=dl&mod=yes&aksi=lihat&kategori=&kid=-9'[SQLI] to exploit the vulnerability.

TRUC 0.11.0 (download.php) Remote File Disclosure Vulnerability

TRUC 0.11.0 is vulnerable to a remote file disclosure vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request contains the filename of the file to be disclosed in the 'upload_filename' parameter. An attacker can use this vulnerability to disclose sensitive information such as configuration files, source code, etc.

Mambo/Joomla Qur’an Component SQL Injection Vulnerability

A SQL injection vulnerability exists in the Qur'an component for Mambo and Joomla. The vulnerability is due to insufficient sanitization of user-supplied input to the 'surano' parameter in the 'index.php' script when handling a 'viewayat' action. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow an attacker to gain access to the affected application, disclose sensitive information, modify data, or exploit further vulnerabilities in the underlying database.

Simple Forum Version 1.10-1.11 SQL Injection

Simple Forum versions 1.10 and 1.11 are vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the database. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. For example, an attacker can append &topic=-99999/**/UNION/**/SELECT/**/concat(0x7c,user_login,0x7c,user_pass,0x7c)/**/FROM/**/wp_users/* to the vulnerable parameter in the URL.

Recent Exploits: