header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Uiga Business Portal SQL/ XSS Vulnerability

Uiga Business Portal is vulnerable to SQL Injection and XSS. An attacker can inject malicious SQL queries into the application to gain access to the database. An attacker can also inject malicious HTML and JavaScript code into the application using the comment box.

Rostermain <= 1.1 (Auth Bypass) SQL Injection Vulnerability

Rostermain version 1.1 is vulnerable to an authentication bypass vulnerability due to improper sanitization of user input. An attacker can exploit this vulnerability by providing a crafted username and password in the login form. The crafted username and password should be ' or' 1=1. This will bypass the authentication and allow the attacker to access the application.

EncapsCMS <= 0.3.6 (config[path]) Remote File Include Vulnerability

EncapsCMS version 0.3.6 and below is vulnerable to a remote file include vulnerability. This vulnerability is due to a lack of sanitization of user input in the 'common_foot.php' file. An attacker can exploit this vulnerability by sending a malicious payload to the 'config[path]' parameter in the 'common_foot.php' file. This can allow an attacker to execute arbitrary code on the vulnerable system.

Killmonster <= 2.1 (Auth Bypass) SQL Injection Vulnerability

Killmonster version 2.1 and below is vulnerable to an authentication bypass vulnerability due to improper sanitization of user-supplied input. An attacker can exploit this vulnerability by supplying a crafted username and password to the login page, bypassing authentication and gaining access to the application.

Joomla Component “com_productbook” SQL Injection Vulnerability

This vulnerability allows an attacker to inject malicious SQL queries into the vulnerable web application. The vulnerable parameter is the "id" parameter in the "com_productbook" component of Joomla. By manipulating the "id" parameter, an attacker can inject malicious SQL queries into the application. The malicious SQL query in this exploit is "UNION all SELECT 1,2,3,concat(username,0x3a,password,0x3a,email),5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58+from+condev.jos_users--" which allows an attacker to extract usernames, passwords, and emails from the database.

UCODE_GET_VERSION ioctl NULL pointer dereference vulnerability on Solaris/OpenSolaris

This exploit is for the UCODE_GET_VERSION ioctl NULL pointer dereference vulnerability on Solaris/OpenSolaris. This vulnerability was discovered by Tobias Klein and was detailed in the Trapkit advisory TKADV2010-001.txt and the NVD CVE-2010-0453. This exploit is written in C and is designed to cause a kernel panic.

Belkatalog CMS— sql injection vulnerability

Belkatalog CMS is comercial cms developed by croatian developer J. K. "Gašo" and it is vulnerable to sql injection vulnerability. An attacker can inject malicious SQL queries via the 'id' and 'lnk' parameters in the 'index.php' script. For example, http://server/index.php?id=m&lnk=-9999+union+all+select+1,version(),3,4,5,6--

Exponent CMS 0.96.3 (articlemodule) Sql Injection Vulnerability

Exponent CMS 0.96.3 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server. The malicious request contains a specially crafted SQL query in the 'id' parameter of the 'view_article' action of the 'articlemodule' module. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.

Recent Exploits: