header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WeBProdZ CMS SQL Injection Vulnerability

WeBProdZ CMS is vulnerable to SQL Injection. The vulnerable code is present in the /backoffice/textos/editar.php file. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter 'id' in the URL. For example, an attacker can send the following malicious SQL queries: -1 UNION ALL SELECT 1,2,3--, -1 UNION ALL SELECT 1,2,concat(username,char(58),password)+from+utilizadores--, -1 UNION ALL SELECT 1,2,concat(username,char(58),password_ori)+from+utilizadores--

Factux LFI Vulnerability

Factux is vulnerable to Local File Inclusion (LFI) vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The vulnerable files are admin_modif.php, admin.php, article_new.php, article_update.php, backup.php, backup_timeout.php, bon_suite.php, and ca_annee.php. An example of exploiting this vulnerability is by sending a maliciously crafted HTTP request to the vulnerable server, such as http://[site]/factux/ca_annee.php?lang=../../index

OCS Inventory NG <= 1.3.1 (login) Remote Authentication Bypass

A vulnerability in OCS Inventory NG Server version 1.3.1 and prior (except 1.02.1 to 1.02.3) allows an attacker to bypass authentication and manipulate data remotely. This is due to the application not properly validating user credentials. An attacker can exploit this vulnerability by sending a specially crafted request to the application.

AV Arcade Search Field XSS/HTML Injection

AV arcade is a free arcade script from AV Scripts. It has features which easily match those of paid scripts. Go to search field and query those strings: HTML Injection: '><marquee>hey, this works!</marquee> XSS: '><script>alert(String.fromCharCode(88,83,83))</script>

GetSimple 2.01 LFI

A Local File Inclusion (LFI) vulnerability exists in GetSimple 2.01, which allows an attacker to read arbitrary files on the server. An attacker must be an admin to exploit this vulnerability. The vulnerable code is present in the download.php file, which allows an attacker to read arbitrary files on the server by passing the file path in the 'file' parameter. For example, an attacker can read the /etc/passwd file by sending a request to http://localhost/GetSimple_2.01/admin/download.php?file=../../../../../etc/passwd.

BaoFeng Storm M3U File Processing Buffer Overflow Exploit

A buffer overflow vulnerability exists in BaoFeng Storm M3U File Processing, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to insufficient boundary checks when processing specially crafted M3U files. An attacker can exploit this vulnerability by enticing a user to open a malicious M3U file, resulting in arbitrary code execution.

slooze.php Command Execution Vulnerability

A vulnerability exists in slooze.php, which allows an attacker to execute arbitrary commands on the vulnerable system. The vulnerability is due to insufficient sanitization of user-supplied input to the 'file' parameter. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable system. Successful exploitation of this vulnerability can result in arbitrary code execution on the vulnerable system.

SQL Injection Vulnerability in Nuke and Authors Table

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'sid' parameter of the 'links.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in the application's database. This can allow the attacker to bypass authentication and gain access to sensitive data, such as passwords, usernames, etc.

Recent Exploits: