header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

[0-Day] PunBB Reputation.php Mod <= v2.0.4 Remote Blind SQL Injection Exploit

This exploit is a Remote Blind SQL Injection vulnerability in PunBB Reputation.php Mod <= v2.0.4. It allows an attacker to gain access to the database of the website. The exploit is coded in Perl and uses LWP::UserAgent, HTTP::Cookies, HTTP::Request::Common, Time::HiRes and IO::Socket modules. It takes three arguments, username, password and ID, and uses a POST request to login and then uses a Blind SQL Injection to gain access to the database.

PHP Paid 4 Mail Script (ID) SQL Injection Vulnerability

The vulnerability exists in the 'paidbanner.php' script, which allows an attacker to inject arbitrary SQL commands via the 'ID' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This can be done by appending the SQL injection string to the vulnerable parameter in the HTTP request.

SerWeb <= 2.1.0-dev1 2009-07-02 Multiple Remote File Inclusion Vulnerabilities

SerWeb versions 2.1.0-dev1 and prior are vulnerable to multiple remote file inclusion vulnerabilities. An attacker can exploit these vulnerabilities by sending a specially crafted HTTP request containing malicious PHP code. This code will be executed on the vulnerable server.

Magician Blog <= 1.0 (Auth Bypass) SQL injection Valunrability

Magician Blog version 1.0 is vulnerable to an authentication bypass vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow an attacker to bypass authentication and gain access to the application.

Magician Blog <= 1.0 Remot SQL injection Valunrability

Magician Blog version 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, such as user credentials and other sensitive data.

Recent Exploits: