header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Aqar Script V.1 Remote By pass Exploit

A vulnerability in Aqar Script V.1 allows an attacker to bypass authentication and gain access to the system. The vulnerability exists due to insufficient validation of user-supplied input in the 'qa2ema.php' script. A remote attacker can exploit this vulnerability to bypass authentication and gain access to the system.

724CMS Enterprise Version 4.59 (section.php) SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a maliciously crafted SQL query to the vulnerable application. This can be done by sending a specially crafted HTTP request to the vulnerable application. The attacker can use the ‘union select’ statement to retrieve data from the database. The attacker can also use the ‘group_concat’ statement to retrieve multiple rows of data from the database.

724CMS Enterprise Version 4.59 (section.php) LFI Vulnerability

A local file inclusion vulnerability exists in 724CMS Enterprise Version 4.59 due to improper validation of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to include arbitrary local files on the web server, which can lead to the disclosure of sensitive information, or the execution of arbitrary code.

Fiomental & Coolsis Backoffice Multi Vulnerability

Fiomental & Coolsis Backoffice is vulnerable to Blind SQL Injection, XSS and Remote Arbitrary Upload Vulnerability. Blind SQL Injection can be exploited by sending a malicious SQL query to the vulnerable parameter. XSS can be exploited by sending a malicious script to the vulnerable parameter. Remote Arbitrary Upload Vulnerability can be exploited by uploading a malicious file to the vulnerable parameter.

Waibrasil Remote / Local File Inclusion

Waibrasil Remote / Local File Inclusion vulnerability allows an attacker to include a file from a remote or local server via a vulnerable web application. The attacker can exploit this issue by manipulating the 'conteudo' parameter value in a malicious manner to execute arbitrary code. The vulnerable code can be found in the 'index.php' script. The attacker can use the 'hhttp://thttp://thttp://phttp://:http:////http://http://http://http://http://http://server/c99.txt?' exploit to include a remote file from a malicious server. The live demo of this exploit can be seen in the 'http://[site]/index.php?conteudo=../../../../etc/passwd' URL.

PHPKB Knowledge Base Software v2 Multilanguage Support Multi SQL Injection Vulnerabilities

Two SQL Injection vulnerabilities were discovered in PHPKB Knowledge Base Software v2 Multilanguage Support. The first vulnerability is located in the 'email.php' file with the vulnerable parameter 'ID'. The second vulnerability is located in the 'comment.php' file with the vulnerable parameter 'ID'. An attacker can inject malicious SQL queries to gain access to sensitive information from the database.

29o3 CMS (LibDir) Multiple RFI Vulnerability

29o3 CMS is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

MiniManager For Mangos/Trinity Server DoS Vulnerability

A Denial of Service vulnerability exists in MiniManager For Mangos/Trinity Server. The vulnerability is caused due to an unspecified error when handling a specially crafted HTTP request. This can be exploited to cause a DoS condition by sending a specially crafted HTTP request to the vulnerable script.

Recent Exploits: