header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MHP Downloadshop <= SQL injection Vulnerability Proof of Concept

An attacker can exploit this vulnerability by sending malicious SQL queries to the database server through the vulnerable web application. This can be done by appending malicious SQL statements to the vulnerable parameter in the web application. This can allow the attacker to gain access to unauthorized data or even gain access to the underlying operating system.

Easy Online Shop <= SQL injection Vulnerability Proof of Concept

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request contains a malicious SQL query in the 'kat' parameter which is used to extract data from the 'users' table. The malicious query is constructed using the UNION operator and the CONCAT() function to concatenate the 'name' and 'password' columns.

Immo Makler <= SQL injection Vulnerability Proof of Concept

A SQL injection vulnerability was discovered in Immo Makler, a PHP script by Easy Laster. The vulnerability allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerable parameter is the 'id' parameter in the 'news.php' script, which can be manipulated to inject malicious SQL code. The malicious code can be used to extract data from the 'user' table, such as the version of the database, userid, name, pass, and email.

D-Link DIR-300 CSRF Vuln. (Change Admin Account Settings) PoC Exploit

This PoC exploit enables remote management for a specific IP address on the D-Link DIR-300 router with firmware version 1.04. No need for an administrator to be logged in. The exploit is tested on Windows 7 Ultimate with Google Chrome, but will work on any other OS.

Softbiz PHP Joke Site Software Multiple SQL injection Vulnerability

An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. The attacker can use the UNION operator to combine the results of two or more SELECT statements into a single result set. The attacker can also use the substring() function to extract information from the database.

SolarFTP 2.0 Multiple Commands Denial of Service Vulnerability

SolarFTP 2.0 will suddenly stop (crash) while these commands were sent: APPE, GET, PUT, NLST, and MDTM. Sending USER with junk also crashing the Admin Configuration but not the service. Stack contains our junk in random. Both EIP and SEH were not overwritten.

Recent Exploits: