exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38433
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, specifically in the POST parameter 'email' of the user registration endpoint. It lacks actual exploit code but references the vulnerability details and affected version.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the registration endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38432
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where unsanitized user input in the 'var' parameter of traffic.php can be exploited. However, no actual exploit code is included, only a description and a sample URL.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38431
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where insufficient input sanitization in the 'BasicLogin' cookie variable allows attackers to manipulate SQL queries. No actual exploit code is included, only a description and reference link.
Classification
Writeup 90%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the target application's registration endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38430
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where unsanitized user input in the reset_password_save.php script can be exploited. The writeup includes a sample URL demonstrating the vulnerable parameters but lacks actual exploit code.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38429
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where unsanitized user input in the 'email' and 'password' parameters of the reset_password.php script can be exploited. No actual exploit code is included, only a description and a URL template for exploitation.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the target application's reset_password.php endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38428
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where the 'site' parameter in 'linktick.php' is not properly sanitized. It lacks actual exploit code but references the vulnerability and its potential impact.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38427
This is a vulnerability writeup describing SQL injection vulnerabilities in PHP Address Book 8.2.5. It provides a URL template demonstrating how unsanitized input parameters can be exploited but does not include functional exploit code.
Classification
Writeup 90%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the target application
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38426
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where the 'id' parameter in 'edit_user.php' is not properly sanitized. It lacks actual exploit code, serving only as a vulnerability description.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the vulnerable endpoint
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38425
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where the 'id' parameter in 'delete_user.php' is not properly sanitized. No actual exploit code is included, only a description and a sample URL.
Classification
Writeup 90%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the target URL
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38434
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where unsanitized user input in the 'username' parameter of 'checklogin.php' can be exploited. No actual exploit code is included, only a description and a sample URL.
Classification
Writeup 80%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the target application's registration page
exploitdb
WRITEUP
VERIFIED
by Jurgen Voorneveld · textwebappsphp
https://www.exploit-db.com/exploits/38435
The provided text describes a SQL injection vulnerability in PHP Address Book 8.2.5, where unsanitized user input in the 'q' parameter of 'admin_index.php' can be exploited. However, no actual exploit code is included, only a description and a sample URL.
Classification
Writeup 90%
Target:
PHP Address Book 8.2.5
No auth needed
Prerequisites:
Access to the vulnerable endpoint