header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GIU Gallery Image Upload 0.3.1 – ‘category’ SQL Injection

GIU Gallery Image Upload 0.3.1 is vulnerable to a SQL injection vulnerability in the 'category' parameter. An attacker can exploit this vulnerability to gain access to sensitive information from the database, such as usernames and passwords. The vulnerability is due to insufficient sanitization of user-supplied input in the 'category' parameter. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This will allow the attacker to gain access to sensitive information from the database.

MV Video Sharing Software 1.2 – ‘searchname’ SQL Injection

MV Video Sharing Software version 1.2 is vulnerable to a SQL injection vulnerability in the 'searchname' parameter of the search.php script. An attacker can send a malicious SQL query to the searchname parameter to execute arbitrary SQL commands in the context of the application's database user. This can be used to access or modify data in the back-end database.

Rukovoditel Project Management CRM 2.3 – ‘path’ SQL Injection

The client+ user group can run sql injection codes. An attacker can send a specially crafted HTTP request to the vulnerable application in order to exploit this vulnerability and execute arbitrary SQL commands in application's database.

Kados R10 GreenBee – ‘release_id’ SQL Injection

All users can run sql injection codes. The POC involves sending a malicious GET request to the update_release.php page with a malicious 'release_id' parameter. This parameter is not properly sanitized and can be used to inject malicious SQL code.

NoMachine Trojan File Remote Code Execution

Possible arbitrary code execution when opening a ".nxs" nomachine file type on client's wintab32.dll preload. This issue regards the client part of all NoMachine installations on Windows (NoMachine free, NoMachine Enterprise Client, NoMachine Enteprise Desktop and NoMachine Cloud Server). 1) create a 32 bit DLL named "wintab32.dll" 2) create an native nomachine ".NXS" file and open it alongside the trojan "wintab32.dll" DLL from Network share or any dir. BOOM!

Centos Web Panel 0.9.8.480 Multiple Vulnerabilities

Centos Web Panel 0.9.8.480 is vulnerable to Command Injection. Attackers can inject malicious commands via the service_start and service_restart parameters in the index.php file. The malicious commands are executed in the context of the web server user.

Recent Exploits: