header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nitrotech <= 0.0.3a Remote Code Execution Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable Nitrotech version 0.0.3a. The vulnerability is due to the lack of input validation in the 'date' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a malicious HTTP request with a specially crafted 'date' parameter. This will allow the attacker to execute arbitrary code on the vulnerable system.

Techno Dreams Announcement (MainAnnounce2.asp) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'key' parameter to '/MainAnnounce2.asp' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, gain access to sensitive data, modify application's data, etc.

Faq Administrator (RFI)

The Faq Administrator script is vulnerable to a Remote File Inclusion (RFI) vulnerability. An attacker can exploit this vulnerability by sending a malicious URL in the 'email' parameter of the faq_reply.php script. This will allow the attacker to execute arbitrary code on the vulnerable server.

Netref 4 (cat_for_aff.php) Source Code Disclosure

Netref 4 (cat_for_aff.php) is vulnerable to source code disclosure. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable script with the parameter 'ad_direct' set to the path of the file to be disclosed. This will allow the attacker to view the source code of the file.

PHPEasyData Pro 2.2.2 (index.php) Remote SQL Injection Exploit

PHPEasyData Pro 2.2.2 is vulnerable to a remote SQL injection vulnerability. This vulnerability allows an attacker to inject malicious SQL queries into the application, which can be used to gain unauthorized access to the application's database. The exploit is triggered when a user submits a specially crafted username and password to the application. The exploit code is written in ASP and uses the ADODB.Connection and ADODB.Recordset objects to connect to the application's database and execute the malicious SQL query.

Simple Website Software v0.99 (common.php) Remote File Include

A vulnerability exists in Simple Website Software v0.99 (common.php) which allows an attacker to include a remote file. This is due to the application not properly sanitizing user-supplied input to the 'SWSDIR' parameter in 'common.php'. An attacker can exploit this vulnerability to include arbitrary remote files, allowing for the execution of arbitrary code on the vulnerable system.

Recent Exploits: