header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

The Walking Club (Auth Bypass)

The Walking Club is vulnerable to an authentication bypass vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to bypass the authentication process and gain access to the application.

eFAQ (Auth Bypass) SQL Injection Vulnerability

eFAQ is prone to an authentication bypass vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this issue to gain access to the application and perform unauthorized actions. This issue affects version 1.0.0; other versions may also be vulnerable.

Novell Netware 6.5 (ICEbrowser) Remote System Denial of Service Exploit

This exploit causes a denial of service on Novell Netware 6.5 (ICEbrowser) by creating a page with a JavaScript URI decode containing a large number of 'A' characters. After the target views the exploit page, the browser will hang and a fault occurs, causing the system to reboot.

Free Bible Search PHP Script (readbible.php) SQL Injection Vulnerability

A SQL injection vulnerability exists in the Free Bible Search PHP Script (readbible.php) which allows an attacker to execute arbitrary SQL commands on the underlying database. This is achieved by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. An attacker can exploit this vulnerability to gain unauthorized access to sensitive information stored in the database, modify data, execute administration operations on the database and in some cases even issue commands to the operating system.

Blue Eye CMS <= 1.0.0 Blind SQL Injection Exploit

This exploit is used to find the sha1 hash of the password of a user in Blue Eye CMS <= 1.0.0. It uses a blind SQL injection vulnerability to find the password of the user. The exploit takes the hostname, path and username as arguments and finds the sha1 hash of the password of the user.

Joomla Component RDAutos SQL Injection Vulnerability

An SQL injection vulnerability exists in the Joomla component RDAutos (com_rdautos) version 1.5.5 Stable. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the back-end database.

Ciansoft PDFBuilderX 2.2 Arbitrary File Overwrite

A vulnerability in Ciansoft PDFBuilderX 2.2 allows an attacker to overwrite arbitrary files on the system. This is due to the application not properly validating user-supplied input when saving a file. An attacker can exploit this vulnerability by convincing a user to open a maliciously crafted HTML file. Successful exploitation could result in the attacker overwriting arbitrary files on the system.

GNUBoard V4.31.03 (08.12.29) Local/Remote File Include Vulnerability

GNUBoard is a widely used bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. But a file include vulnerability affects SIR GNUBoard. In special conditions,it may be used as a remote file include vulnerability which can be used to execute arbitrary PHP code on an affected computer with the privileges of the affected Web server.

Recent Exploits: