header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Secure Copy Content Protection and Content Locking 2.8.1 – SQL-Injection (Unauthenticated)

The Secure Copy Content Protection and Content Locking WordPress plugin before 2.8.2 does not escape the sccp_id parameter of the ays_sccp_results_export_file AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an SQL injection.

Home Owners Collection Management System 1.0 – ‘id’ Blind SQL Injection

This exploit is a blind SQL injection vulnerability in the Home Owners Collection Management System 1.0. The vulnerable code is located in the file '/hocms/admin/members/view_member.php' on line 68. The vulnerable code is a query that takes the 'id' parameter from the GET request and uses it in the query without any sanitization. An attacker can use the sqlmap tool to exploit this vulnerability and gain access to the database.

Hospital Management Startup 1.0 – ‘loginid’ SQLi

The loginid and password parameters from Hospital Management Startup 1.0 appear to be vulnerable to SQL injection attacks. The attacker can retrieve all information from the administrator account of the system and he can use the information for malicious purposes! WARNING: If this is in some external domain, or some subdomain, or internal, this will be extremely dangerous!

WordPress Plugin CP Blocks 1.0.14 – Stored Cross Site Scripting (XSS)

A stored XSS vulnerability was discovered in WordPress Plugin CP Blocks version 1.0.14. An attacker can inject malicious JavaScript payload into the 'License ID' field, which will be stored in the database. When the same functionality is triggered, the payload will be executed, resulting in a pop-up.

WordPress Plugin Security Audit 1.0.0 – Stored Cross Site Scripting (XSS)

A stored cross-site scripting (XSS) vulnerability was discovered in the WordPress Plugin Security Audit version 1.0.0. An attacker can inject malicious JavaScript payloads into the 'Data Id' field of the Security Audit settings, which will be stored in the database. When the same functionality is triggered, the malicious payload will be executed, allowing the attacker to perform malicious activities such as stealing user data or executing arbitrary code.

WordPress Plugin Simple Job Board 2.9.3 – Local File Inclusion

WordPress Plugin Simple Job Board 2.9.3 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability to gain access to sensitive files on the server. The vulnerability exists due to the lack of proper input validation in the 'action' and 'method' parameters of the 'sjb_ajax_action' AJAX action. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with the malicious 'file_path' parameter. This will allow the attacker to read any file on the server.

WordPress Plugin International Sms For Contact Form 7 Integration V1.2 – Cross Site Scripting (XSS)

This plugin creates a cf7-international-sms-integration from any post types. The slider import search feature and tab parameter via plugin settings are vulnerable to reflected cross-site scripting.

FileBrowser 2.17.2 – Cross Site Request Forgery (CSRF) to Remote Code Execution (RCE)

A Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE.

Recent Exploits: