header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apache Axis2(1.4.1) Local File Inclusion Vulnerability

Apache Axis2 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a maliciously crafted URL parameter to the vulnerable server. This URL parameter can be used to include a malicious file from the server's local file system. The malicious file can then be used to gain access to the server's resources or to execute arbitrary code on the server.

Schaf-CMS 1.0 SQL Injection Vulnerability

Schaf-CMS 1.0 is vulnerable to SQL Injection. The vulnerable file is cms.php?id= [SQL]. An example exploit is +or+(select+count(*)+from+(select+1+union+select+2+union+select+3)x+group+by+concat(concat_ws(0x0b,version(),user(),database(),@@version_compile_os),floor(rand(0)*2)))--+

BBMedia Design’s (news_more.php) SQL Injection Vulnerability

The vulnerability exists in the 'news_more.php' script, which allows an attacker to inject malicious SQL queries via the 'id' parameter. An example of a malicious URL is http://[target]/[path]/news_more.php?id=-9999+union+all+select+1,2,concat(id,0x3a,user,0x3a,pass),4,5,6,7,8+from+users/*

Telia Web Design (index.php) SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in Telia Web Design (index.php) to gain access to the admin panel. The attacker can send a malicious HTTP request to the vulnerable application, which contains a specially crafted SQL query in the 'id' parameter. This query will return the username and password of all users in the database, allowing the attacker to gain access to the admin panel.

runt-communications Design (property_more.php) SQL Injection Vulnerability

An attacker can exploit a SQL injection vulnerability in the runt-communications Design property_more.php script to gain access to the admin panel. The attacker can send a malicious HTTP request to the property_more.php script with an ID parameter set to a value of -9999 union select 0,version(),2,3,group_concat(username,0x3a,password),5,6,7,8,9,10,11 from users. This will allow the attacker to gain access to the admin panel located at http://localhost/[path]/admin.

eCreo SQL Injection Vulnerability

eCreo is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable application. This can be done by appending malicious SQL queries to the vulnerable parameter 'nr' in the 'go.php' page. This can allow an attacker to gain access to sensitive information stored in the database.

Recent Exploits: