header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NetRisk 1.9.7 Remote Password Change Exploit

This exploit allows an attacker to change the password of any user on the NetRisk 1.9.7 board. The vulnerability is due to a lack of authentication when changing the password. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the board. This will allow the attacker to change the password of any user on the board.

INVISION POWER BOARD 2.1.7 EXPLOIT

This exploit is a proof-of-concept (POC) package for Invision Power Board 2.1.7 which consists of several parts - an active XSS generator, a JS-file, a log viewer, and a special component which takes necessary data from MySQL forum's tables in case if intercepted session belonged to a person with moderator privileges.

SNETWORKS PHP CLASSIFIEDS Remote File Include Vulnerability

A remote file include vulnerability exists in SNETWORKS PHP CLASSIFIEDS, which allows an attacker to include a remote file containing arbitrary code and execute it on the vulnerable server. This vulnerability is due to a failure in the application to properly sanitize user-supplied input to the 'path_escape' parameter in the 'config.inc.php' script. An attacker can exploit this issue by enticing an unsuspecting user to follow a malicious URI. Successful exploitation could result in arbitrary code execution in the context of the webserver process.

Clipshare Remote User Password Change Exploit

Clipshare 2.6 Remote User Password Change Exploit allows an attacker to change the password of a user by exploiting a vulnerability in the Clipshare 2.6 script. The attacker can send a POST request to the useredit.php page with the user ID and the attacker's email address. The attacker can then send a POST request to the recoverpass.php page with the attacker's email address to receive the new password.

samPHPweb (songinfo.php) Remote SQL Injection

A remote SQL injection vulnerability exists in the songinfo.php script of samPHPweb. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script with the songid parameter set to a malicious value. This can allow the attacker to execute arbitrary SQL commands on the underlying database, potentially resulting in the disclosure of sensitive information.

samPHPweb Remote File Include Vulnerability

A remote file include vulnerability exists in samPHPweb, which allows an attacker to include a remote file on the affected server. This vulnerability is due to insufficient sanitization of user-supplied input to the 'commonpath' parameter in the 'db.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request containing a URL-encoded PHP script in the 'commonpath' parameter. This will cause the remote file to be included and executed on the affected server, allowing the attacker to execute arbitrary code on the affected server.

NetRisk <= 1.9.7 Remote/Local File Inclusion Vulnerability

A vulnerability exists in NetRisk version 1.9.7 and earlier which allows an attacker to include a remote file or a local file on the server. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The maliciously crafted HTTP request contains a maliciously crafted parameter which is used to include a remote file or a local file on the server.

Site@School <= 2.3.10 Remote Blind SQL Injection Exploit

The $album_name parameter in Site@School <= 2.3.10 is not properly checked, resulting in a SQL injection vulnerability at line 128. An attacker can inject other SQL code in the third field of the query to result in another SQL injection at line 151, but the explode() function at line 140 will split the IDs in the third field of the query, so the attacker cannot inject other SQL code.

video sharing www.clip-share.com Remote SQL Injection Exploit All Version

A vulnerability exists in video sharing www.clip-share.com which allows an attacker to inject arbitrary SQL commands into the application. This can be exploited to gain access to sensitive information such as usernames and passwords. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application.

Recent Exploits: