header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP121 Instant Messenger <= 1.4 $_SESSION[sess_username] Remote Cmmnds Xctn

A vulnerability exists in PHP121 Instant Messenger <= 1.4 due to the insecure usage of $_SESSION[sess_username] variable in php121login.php and other files. An attacker can exploit this vulnerability to execute arbitrary commands on the vulnerable system.

Clansys 1.1 Remote SQL Injection

Clansys 1.1 is vulnerable to a remote SQL injection vulnerability due to the lack of proper input validation. An attacker can exploit this vulnerability by sending a malicious SQL query to the application. This query can be used to extract sensitive information from the database, such as passwords which are stored in plaintext.

XBrite Members <= 1.1 remote sql injection vulnerability

XBrite Members version 1.1 and prior are vulnerable to a remote SQL injection vulnerability. If the PHP configuration directive magic_quotes_gpc is set to Off, an attacker can inject arbitrary SQL code into the application by manipulating the 'id' parameter in the 'members.php' script. This can be used to extract the MD5 hashes of all user passwords from the database.

dnGuestbook <= v2.0 remote sql injection vulnerability

Because of the false implemented userinputs, an attacker can login as admin with a simple SQL injection. Afterward, they can exploit a not validated GET variable to get admin's email and password. The script only verifies if a result is given back, and doesn't check if the entered email and password are the same as the email and password in the database.

PhpOpenChat 3.0.x ADODB Server.php “sql” SQL injection

This vulnerability is based on a flaw in the PhpOpenChat 3.0.x ADODB Server.php file, which allows an attacker to inject arbitrary SQL commands. This vulnerability is very hard to exploit, however, as it requires a 'root' user with no password, an existent 'test' database and Mysql to have certain rights to write files.

Recent Exploits: