header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

freejokesscript = 1.0 (joke-archives.php) remote sql injection vulnerability & admin bypass vulnerability

A vulnerability exists in freejokesscript = 1.0 (joke-archives.php) which allows an attacker to inject malicious SQL commands and bypass the admin authentication. The vulnerability is due to insufficient sanitization of user-supplied input in the 'cat_name' and 'cat_id' parameters of the 'joke-archives.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL commands to the vulnerable script. Successful exploitation could result in unauthorized access to the application, disclosure of sensitive information, and other attacks.

PHP Krazy Image Host Script 1.01

A vulnerability exists in PHP Krazy Image Host Script 1.01 due to improper sanitization of user-supplied input in the 'id' parameter of the 'viewer.php' script. An attacker can exploit this vulnerability to inject arbitrary SQL commands and gain access to the application database, resulting in the disclosure of sensitive information.

Remote Exploit (Admin credentials extract + File Disclosure via Sql Injection)

A remote exploit was discovered in InselPhoto v1.1 which allows an attacker to extract admin credentials and disclose files via SQL Injection. The vulnerable file is /[path]/search.php line 37. The SQL Injections used by this exploit are [1] ' union select 0,0,concat(username,0x3a,password),0,0,0,0,0 from inselphoto_users# and [2] ' union select 0,0,load_file('lf'),0,0,0,0,0#.

Scripts Den Dating Demo V9.01(searchmatch.php) SQL Injection Vulnerability

A SQL injection vulnerability exists in Scripts Den Dating Demo V9.01(searchmatch.php) which allows an attacker to execute arbitrary SQL commands on the vulnerable system. By sending a specially crafted HTTP request to the vulnerable application, an attacker can execute arbitrary SQL commands on the underlying database. This can be used to bypass authentication, access, modify and delete data within the database.

Dacio’s PHP scripts CMS v1.08 Remote SQL Injection Vuln.

Dacio's PHP scripts CMS version 1.08 is vulnerable to remote SQL injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

Directory traversal vulnerability in Geovision Digital Video Surveillance System (geohttpserver)

A directory traversal vulnerability exists in Geovision Digital Video Surveillance System (geohttpserver) version 8.2, which allows an attacker to access arbitrary files on the system. This is achieved by sending a specially crafted HTTP request containing directory traversal sequences such as '../' to the vulnerable server.

SkaDate Dating Remote Shell Upload

A vulnerability in SkaDate Dating allows an attacker to upload a malicious shell to the server. The attacker can then use the shell to execute arbitrary commands on the server. The vulnerability exists due to insufficient validation of the uploaded file type. An attacker can exploit this vulnerability by uploading a malicious PHP file with a double extension such as “shell.php.jpg”. The malicious file will be uploaded to the server and can be accessed via a web browser.

TYPO3-SA-2009-002 exploit by Lolek of TK53

This exploit is used to gain access to the content of a file on a TYPO3 server. It works by sending a request to the server with a jumpurl parameter set to the file to be accessed, a type parameter set to 0, a juSecure parameter set to 1, and a locationData parameter set to 1:. The server then responds with a juHash parameter which is used to access the content of the file. The exploit is used to gain access to the typo3conf/localconf.php file.

Recent Exploits: