header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Yamamah Photo Gallery 1.00 SQL Injection Vulnerability

Yamamah Photo Gallery 1.00 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and extract sensitive information such as usernames and passwords.

UTStats XSS, SQL Injection & Full path disclosure

The exploit allows for XSS, SQL Injection and Full Path Disclosure vulnerabilities in all recent versions of UTStats. XSS can be exploited by sending a malicious payload to pages/match_report.php?mid=, while SQL Injection can be exploited by sending a malicious payload to index.php?p=matchp&pid=' and Full Path Disclosure can be exploited by sending a malicious payload to pages/servers_info.php.

Unreal3.2.8.1 Remote Downloader/Execute Trojan

This exploit is a remote code execution vulnerability in Unreal3.2.8.1. It allows an attacker to execute arbitrary code on the vulnerable system by sending specially crafted payloads to the Unreal3.2.8.1 server. The payloads can be used to download and execute malicious code, delete files, or shutdown the server.

phpplanner <= PHP Planner v.0.4 Multiple Vulnerabilities

Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. Remote System Init vulnerability allows the attacker to reset the system by entering the page (.php.lock). Cross Site Request Forgery (CSRF) is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. SQL Injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

Litespeed Technologies Web Server Remote Poison null byte Zero-Day

LiteSpeed Technologies Web Server Remote Source Code Disclosure zero-day Exploit discovered and exploited by Kingcope in June 2010. The exploit allows an attacker to remotely access the source code of a file on the server. The exploit works by sending a specially crafted HTTP request with a null byte at the end of the file name. The server then responds with the source code of the requested file.

Infront SQL Injection Vulnerability

The Infront software is vulnerable to a SQL injection attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. The request contains a malicious SQL query that can be used to extract sensitive information from the database, such as user credentials. The vulnerable file is breaking_news.php and the exploit code is http://target/path/breaking_news.php?newsid=union select 1,2,3,concat(email,0x3e,user,0x3e,pass),5,6+FROM+login. After exploiting the vulnerability, the attacker can login to the server using the extracted credentials.

phpplanner XSS / SQL Vulnerability

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable application. The malicious query can be sent via the 'userid' parameter in the 'userinfo.php' page. An attacker can also exploit this vulnerability by sending a malicious XSS payload to the vulnerable application. The malicious payload can be sent via the 'msg' parameter in the 'notice.php' page.

Recent Exploits: