header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

NotSopureEdit <= 1.4.1 Remote File Include Vulnerability

NotSopureEdit is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the vulnerable application. Successful exploits will result in the compromise of the application and the underlying system; other attacks are also possible.

WebMaid CMS <= 0.2-6 Beta Multiple Remote File Include Vulnerability

WebMaid CMS version 0.2-6 Beta is vulnerable to multiple Remote File Include vulnerabilities. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. This can allow the attacker to execute arbitrary code on the server, depending on the privileges associated with the application. The vulnerable parameters are 'template', 'menu' and 'events' which can be found in the index.php file.

Fw-BofF (oolime-resurrection) 1.5.3beta Multiple Remote Include Vulnerability

Fw-BofF (oolime-resurrection) 1.5.3beta is vulnerable to multiple remote include vulnerabilities. An attacker can exploit this vulnerability by sending a maliciously crafted request to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

Woltlab Burning Board Lite Addon (lexikon.php) SQL Injection Vulnerability

A vulnerability exists in Woltlab Burning Board Lite Addon (lexikon.php) which allows an attacker to inject malicious SQL queries via the 'id' parameter. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information such as usernames and passwords.

Jewelry Cart Software SQL Injection (product.php)

A SQL injection vulnerability exists in Jewelry Cart Software, which allows an attacker to execute arbitrary SQL commands via the 'disproid' parameter in the 'product.php' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. This can be done by appending a SQL query to the 'disproid' parameter, such as 'http://www.victim.com/product.php?disproid=53+AND+1=2+UNION+SELECT+0,1,version%28%29,3,4--'

Ksysguard RCE via Cross Application Scripting

Ksysguard is vulnerable to Cross Application Scripting (CAS) which allows an attacker to execute arbitrary code on the target system. The exploit code provided by the author is a ph33r.sgrd file which contains a command to open a netcat listener on port 31337 and execute a bash shell. The vulnerability affects versions of Ksysguard up to and including 4.4.1.

Pay Per Watch & Bid Auktions System BLIND SQL Injection auktion.php (id_auk)

A vulnerability in the Pay Per Watch & Bid Auktions System allows an attacker to inject malicious SQL commands into the 'id_auk' parameter of the 'auktion.php' script. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. This can be used to disclose the contents of the database, including usernames and passwords.

joomla component Gift Exchange com_giftexchange (pkg) Remote Sql Injection

A vulnerability exists in the Gift Exchange component of Joomla, version 1.0beta, which allows an attacker to inject arbitrary SQL commands via the 'pkg' parameter in the 'showcase' view. This can be exploited to gain access to sensitive information such as usernames and passwords.

Recent Exploits: