header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Galaxy Forces MMORPG 0.5.8 – ‘type’ SQL Injection

Galaxy Forces MMORPG 0.5.8 is vulnerable to 'type' SQL Injection. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code in the 'type' parameter of the 'ads.php' script.

Net-Billetterie 2.9 – ‘login’ SQL Injection

Net-Billetterie 2.9 is vulnerable to SQL Injection. This vulnerability exists due to insufficient sanitization of user-supplied input in the 'login.inc.php' script. An attacker can exploit this vulnerability to gain access to the application and execute arbitrary SQL commands in the back-end database.

BitZoom 1.0 – ‘rollno’ SQL Injection

BitZoom 1.0 is vulnerable to SQL Injection. An attacker can send a specially crafted HTTP request to the vulnerable application in order to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate the data in the database, disclose sensitive information, or even gain access to the underlying system.

Precurio Intranet Portal 2.0 – Cross-Site Request Forgery (Add Admin)

Precurio Intranet Portal 2.0 is vulnerable to Cross-Site Request Forgery (CSRF) which allows an attacker to add an admin user to the portal. An attacker can craft a malicious request to add an admin user to the portal. The malicious request can be sent to the victim via email, chat, etc. When the victim clicks on the malicious link, the attacker can add an admin user to the portal.

Electricks eCommerce 1.0 – Cross-Site Scripting

When a user signs up for an account on the following url: Electricks-shop/pages/user_signup.php, the contact info input field isn't validated before displaying it to the admin control panel page where the script will be executed. For testing, an admin can register at /Electricks-shop/pages/admin_signup.php by sending a POST request with a malicious script in the contact field.

Rmedia SMS 1.0 – SQL Injection

Rmedia SMS 1.0 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to extract sensitive information from the database. This can be done by sending a specially crafted HTTP request to the vulnerable application. The request contains a malicious SQL query that will extract information from the database.

Recent Exploits: