header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PLE CMS 1.0 beta 4.2 Blind SQL Injection Exploit

This exploit is used to gain access to the password of a user in the PLE CMS 1.0 beta 4.2 software. It uses a GET request to the login.php page with a crafted SQL query to determine the password of the user. The exploit uses a loop to iterate through each character of the password and determine its value.

Motorola Wimax modem CPEi300 Multiple Vulnerabilities

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'page' parameter in 'sysconf.cgi' script. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site, or to traverse directories via directory traversal attacks.

Internet Explorer 7 Clickjacking

This exploit allows an attacker to hijack a user's click on a web page. The attacker can use this vulnerability to redirect the user to a malicious website or to perform a malicious action on the user's behalf. The vulnerability exists in Internet Explorer 7 and is caused by the browser not properly validating user input. The attacker can craft a malicious web page that contains a hidden element that is positioned over a legitimate link. When the user clicks on the link, the hidden element is triggered and the user is redirected to a malicious website or the malicious action is performed.

Multiple Remote SQL Injections in GLPI v 0.71.3

GLPI cleans the POSTS and GETS making it safe from cross side scripting and Slahsing it if magic_quotes_gpc OFF. However, it is possible to inject the parameter ID with no need to use a quote. This can be exploited to execute arbitrary SQL commands by sending a specially crafted HTTP request to the vulnerable application.

Coppermine Photo gallery – Remote PHP File Upload

The Coppermine Photo Gallery is vulnerable to a remote PHP file upload vulnerability due to a bypass of the anti-register_globals security. This vulnerability allows an attacker to upload malicious PHP files to the server, which can be used to gain access to the server. The vulnerability is present in version 1.4.19 of the Coppermine Photo Gallery and can be exploited by setting the register_globals parameter to 'on'. A patch is available to fix the vulnerability by unsetting all variables except for the superglobals.

Star Articles 6.0 SQL Injection Vulnerability

Star Articles 6.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to manipulate SQL queries in the back-end database, allowing the manipulation or disclosure of arbitrary data. This may lead to a compromise of the application, disclosure or modification of data, or may permit the attacker to exploit vulnerabilities in the underlying database implementation.

Recent Exploits: