header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oracle 10g R1 xDb.XDB_PITRIG_PKG.PITRIG_TRUNCATE SQL Injection Exploit

This exploit allows an attacker to gain access to the password hashes of Oracle 10g R1 users. The exploit uses the XDB.XDB_PITRIG_PKG.PITRIG_TRUNCATE function to execute a malicious SQL statement that inserts the user_id, username, and password of all users into a table called SH2KERR. The attacker can then access the table to view the password hashes.

WordPress Plugin fGallery 2.4.1

A vulnerability exists in the Wordpress Plugin fGallery 2.4.1, which allows an attacker to inject malicious SQL queries into the application. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'album' parameter in the 'fim_rss.php' script. This can be exploited to disclose the admin credentials of the application.

WordPress Plugin WP-Cal Remote SQL Injection Vulnerability

A Remote SQL Injection vulnerability exists in the Wordpress Plugin WP-Cal. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to gain access to sensitive information such as usernames, passwords, and emails stored in the database.

bubbling library v1.32 multiple Local File Inclusion Vulnerabilities

bubbling library v1.32 is vulnerable to multiple Local File Inclusion vulnerabilities. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The attacker can include a local file on the server by using the vulnerable parameters page, tpl, uri, etc. This can lead to the disclosure of sensitive information such as system and application data, and may lead to further attacks.

SQL Injection Vulnerabilities in phpIP 4.3.2

There exist numerous SQL injection vulnerabilities in phpIP 4.3.2, and probably previous versions. Most of the data obtained from the request variables ($_GET, $_POST, $_COOKIE, etc) is not sanitized before it is passed to MySQL. This may result in un-authorized administrative access to phpIp and read-access to the database, among other things. One such vulnerability allows an attacker to gain administrative access to the application, this does not require the attacker to already have access to an existing user account. There is also the risk of information disclosure through another SQL injection vulnerability found in display.php.

SIMPLE FORUM v 3.2 MULTIPLE VULNERABILITIES

SIMPLE FORUM v3.2 is vulnerable to XSS and Remote File Disclosure. XSS can be exploited by sending a malicious payload in the 'open' and 'date_show' parameters of the forum.php page. Remote File Disclosure can be exploited by sending a malicious payload in the 'file' parameter of the thumbnail.php page.

Namo Web Editor NamoInstaller.dll install Method Exploit

A vulnerability exists in Namo Web Editor ActiveSquare 6 NamoInstaller.dll which allows remote attackers to execute arbitrary code. The vulnerability is due to a design error when handling the Install() method of the ActiveX control. By using the Install() method, a remote attacker can execute arbitrary code on the vulnerable system.

Flinx 1.3 & Below Remote SQL Injection Vulnerability

A vulnerability exists in Flinx 1.3 & below which allows an attacker to inject arbitrary SQL commands. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'id' parameter in category.php. An attacker can use this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords.

Recent Exploits: