header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

XOOPS 2.0.14 (article.php) SQL Injection Vulnerability

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.

Blogman v0.7.1 (profile.php) SQL Injection Exploit

Blogman v0.7.1 is vulnerable to a SQL injection vulnerability in the profile.php page. An attacker can exploit this vulnerability by sending a crafted HTTP request with a malicious payload to the vulnerable page. This payload will allow the attacker to extract the username and password of the user with the specified UserID.

LEADTOOLS ActiveX Raster Twain v16.5 (LtocxTwainu.dll) Remote Buffer Overflow PoC

The Raster Twain Object Library suffers from a buffer overflow vulnerability because it fails to check the boundry of the user input.

Auth Bypass SQL Injection Vulnerability

An authentication bypass vulnerability exists in Shop Creator 4.0 due to improper validation of user-supplied input. An attacker can exploit this vulnerability to bypass authentication and gain access to the admin page. To exploit this vulnerability, an attacker can use the username 'pouya' and the password ' or '.

pc4uploader [XSRF] Add Admin Exploit

This exploit allows an attacker to add an admin account to the Pc4Uploader software. The attacker can set the username, password, and email address of the new admin account. The attacker can also set the permissions of the new admin account, such as setting the account to have full access to the software.

Remote Command Execution Vulnerability and Remote File Inclusion Vulnerability

Esvon Classifieds (pdo.inc.php) and (class.phpmailer.php) are vulnerable to Remote Command Execution and Remote File Inclusion. An attacker can exploit this vulnerability by sending a maliciously crafted URL to the vulnerable server. The URL should contain the malicious code in the 'sql' parameter for Remote Command Execution and the 'lang_path' parameter for Remote File Inclusion.

pecio CMS v2.0.5 (template) Multiple Remote File Include Vulnerability

Pecio is a content management system written in PHP with the intention to be a small, simple and lightweight cms for people who want to create websites including old-style information and new-style blog part. It is vulnerable to multiple remote file include vulnerability which allows an attacker to include a remote file on the web server. This can be exploited to execute arbitrary PHP code by including a malicious file from a remote location.

Recent Exploits: