header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

XOOPS Module: tadbook2

A SQL injection vulnerability exists in XOOPS Module: tadbook2, which allows an attacker to execute arbitrary SQL commands via the 'book_sn' parameter in open_book.php. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is confirmed in version 2.0. The vulnerability is also present in other versions.

phpMDJ <= 1.0.3 Blind SQL Injection Exploit

This exploit allows an attacker to gain access to the database of a vulnerable phpMDJ application. The exploit uses a blind SQL injection vulnerability to extract the password of a given user. The exploit sends a specially crafted HTTP request to the vulnerable application, which then returns a response indicating whether the character at the given position of the user's password is correct or not.

dzCMS SQL Injection Vulnerability

A SQL injection vulnerability exists in DZcms v.3.1, a content management system developed by CyDezines. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames and passwords. The vulnerability is triggered when an attacker sends a maliciously crafted HTTP request to the vulnerable application. The Google Dork “Powered by DZcms” can be used to identify vulnerable websites. A proof-of-concept (POC) is available at http://www.demo.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/* and a demo is available at http://www.psgdynamicsystems.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/*. The vulnerability was discovered by Glafkos Charalambous and was published on milw0rm.com on January 11, 2009.

Fast Guest Book (Auth Bypass) SQL Injection Vulnerability

A vulnerability exists in Fast Guest Book, which allows an attacker to bypass authentication and gain access to the admin panel. This is due to the application failing to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by supplying a specially crafted 'or' statement in the username field.

Joomla newsflash Sql injection

An SQL injection vulnerability exists in the Joomla and Mambo newsflash component. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerable parameter is the 'id' parameter in the 'com_newsflash' component. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable web application.

VUPlayer 2.49 .ASX File (HREF) Universal Buffer Overflow

VUPlayer 2.49 is vulnerable to a buffer overflow vulnerability when processing a specially crafted .ASX file. The vulnerability is caused due to a boundary error when handling the 'HREF' parameter within the .ASX file. This can be exploited to cause a stack-based buffer overflow by supplying a long string of data in the 'HREF' parameter.

Recent Exploits: