header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ero Auktion V.2.0 SQL Injection news.php

An SQL injection vulnerability exists in Ero Auktion V.2.0, which allows an attacker to execute arbitrary SQL commands via the 'id' parameter in the 'news.php' script. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL statements to the vulnerable application. This can be done by appending the malicious SQL statement to the 'id' parameter in the 'news.php' script, such as 'www.site.com/flashauktion/news.php?id=11111111+union+select+1,2,concat%28name,0x3a,password%29,4,5+from+users'.

Softbiz Jobs ( news_desc) SQL Injection Vulnerability

Softbiz Jobs ( news_desc) is vulnerable to SQL injection. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'id' in the 'news_desc.php' script. This can allow the attacker to gain access to the admin panel of the application.

TimeClock Remote Add Admin Exploit

TimeClock is a free open-source application released under the GPL. It is vulnerable to a Remote Code Execution vulnerability due to an insecure form submission. An attacker can exploit this vulnerability by crafting a malicious form submission to the add_user.php script, which will add an administrator user to the application. This can be used to gain access to the application and potentially execute arbitrary code on the server.

Phpkit 1.6.1 SQL Injection member.php

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'searchstr' parameter to '/include.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit various vulnerabilities in the underlying SQL server software, etc.

SQL Injection in PhoneDirectory.php

The PhoneDirectory.php script is vulnerable to SQL injection. An attacker can exploit this vulnerability by passing malicious SQL statements in the 'ID' parameter of the GET request. This can allow an attacker to gain access to sensitive information such as user credentials and other data stored in the database.

Recent Exploits: