header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpscripte24 Vor und Rückwärts Auktions System Blind SQL Injection auktion.php

A Blind SQL Injection vulnerability exists in the phpscripte24 Vor und Rückwärts Auktions System, which allows an attacker to extract sensitive information from the database. The vulnerability is located in the 'auktion.php' script when processing the 'id_auk' parameter. An attacker can inject malicious SQL queries to extract sensitive information from the database. This can be exploited to gain access to the database and extract sensitive information such as passwords.

68kb Knowledge Base v1.0.0rc3 edit main settings CSRF

This exploit allows an attacker to modify the main settings of the 68kb Knowledge Base v1.0.0rc3 application. The attacker can craft a malicious HTML page that contains a form with hidden fields that will be automatically submitted when the page is loaded. The form contains the parameters that can be modified, such as the site name, keywords, description, email, maximum search results, comments, and cache time. When the page is loaded, the form is automatically submitted and the settings are modified.

68kb Knowledge Base v1.0.0rc3 create administrator account CSRF

This exploit allows an attacker to create an administrator account on the 68kb Knowledge Base v1.0.0rc3 software. The attacker can craft a malicious HTML page that contains a form with hidden fields that contain the username, email, level, password, and passconf of the new account. When the victim visits the malicious page, the form is automatically submitted and the new account is created. The attacker can also use the same technique to delete or edit existing accounts.

velhost uploader script v1.2 Local File Inclusion Vulnerability

velhost uploader script v1.2 is vulnerable to Local File Inclusion vulnerability. An attacker can exploit this vulnerability to include arbitrary files from the local system. This vulnerability is caused due to the use of user-supplied input without proper validation. An attacker can exploit this vulnerability by passing malicious input to the 'language' parameter in the 'upload.php' script. This can be exploited to include arbitrary files from the local system.

Joomla Component com_football SQL Injection Vulnerability

A SQL injection vulnerability exists in the Joomla component com_football. An attacker can send a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to the underlying database. The vulnerable parameter is the ‘leagueID’ parameter which is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application in order to gain access to the underlying database.

Joomla Component com_ops SQL Injection Vulnerability

A SQL injection vulnerability exists in the Joomla component com_ops. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'location_id' in the URL. This can allow the attacker to gain access to the database and execute arbitrary SQL queries.

DynPG CMS v4.1.0 Multiple Vulnerability

DynPG CMS v4.1.0 is prone to multiple vulnerabilities, including SQL injection, cross-site scripting, and remote file inclusion. The SQL injection vulnerability exists due to insufficient sanitization of user-supplied data in the 'id' parameter of the 'index.php' script. An attacker can exploit this issue to manipulate SQL queries and gain access to sensitive information. The cross-site scripting vulnerability exists due to insufficient sanitization of user-supplied data in the 'id' parameter of the 'index.php' script. An attacker can exploit this issue to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. The remote file inclusion vulnerability exists due to insufficient sanitization of user-supplied data in the 'id' parameter of the 'index.php' script. An attacker can exploit this issue to include arbitrary remote files and execute arbitrary PHP code in the context of the webserver process.

Joomla Component com_menu SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'id' of the 'com_menu' component. An example of a malicious query is '-1+UNION+SELECT+1,2,3,4,5,6--' which can be sent to the vulnerable parameter as 'http://127.0.0.1/index.php?option=com_menu&id=-1+UNION+SELECT+1,2,3,4,5,6--'

Exploit Title: Free MP3 CD Ripper 2.6 0 day

A buffer overflow vulnerability exists in Free MP3 CD Ripper 2.6. An attacker can exploit this vulnerability by opening the application, selecting File -> WAV Converter -> WAV to MP3, and then printing the contents into a text file. Saving the text file as a .wav and then opening the .wav file can trigger the vulnerability.

Recent Exploits: