header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Easy File Uploader 1.7 – SQL Injection / Cross-Site Scripting

Non-authorized users can perform the attack in the editing area. The SQL Injection payloads include boolean-based blind, error-based, AND/OR time-based blind and UNION query. The Cross-Site Scripting payload includes a malicious script.

NewsBee CMS 1.4 – ‘download.php’ SQL Injection

NewsBee CMS 1.4 is vulnerable to SQL Injection. The vulnerability exists in the 'download.php' file, where the 'id' and 't' parameters are vulnerable to SQL Injection. The exploitation of this vulnerability can be done using boolean-based blind, error-based, AND/OR time-based blind and UNION query techniques. The exploitation of this vulnerability can lead to the compromise of the application and the underlying system.

Feedy RSS News Ticker 2.0 – ‘cat’ SQL Injection

Feedy RSS News Ticker 2.0 is vulnerable to SQL Injection. The vulnerability exists in the 'cat' parameter of the 'category.php' page. An attacker can exploit this vulnerability to execute arbitrary SQL commands in the backend database. The vulnerability can be exploited using boolean-based blind and AND/OR time-based blind SQL injection techniques.

Auto car 1.2 – ‘car_title’ SQL Injection / Cross-Site Scripting

Auto car 1.2 is vulnerable to SQL Injection and Cross-Site Scripting. An attacker can exploit this vulnerability by sending a malicious payload to the 'car_title' parameter in the search-cars page. This payload will execute an XPATH query and return the username of the database. An attacker can also exploit the Cross-Site Scripting vulnerability by creating an account and sending a malicious payload in the 'name' parameter of the edit profile page. This will execute a JavaScript alert box in the page.

Speculative Execution Side-Channel Vulnerability

Speculative Execution Side-Channel Vulnerability is a type of vulnerability that exploits the speculative execution process of modern processors. It is a vulnerability that allows an attacker to access sensitive data from the processor’s memory by exploiting the speculative execution process. The attacker can use this vulnerability to gain access to sensitive data such as passwords, encryption keys, and other confidential information. The vulnerability is caused by the processor’s speculative execution process, which is used to improve performance by predicting which instructions will be executed and pre-executing them. This process can be exploited by an attacker to gain access to sensitive data.

Siemens SIMATIC S7-1500 CPU – Remote Denial of Service

This exploit is for Siemens SIMATIC S7-1500 CPU all versions before V1.6. It allows a remote attacker to send a malicious string to the vulnerable TCP port 102, which will cause a denial of service. The malicious string is 'some evil string '

ERPnext 11.x.x – Cross-Site Scripting

ERPnext v11.x.x-develop is vulnerable to XSS like Stored, Reflected, Cookie, and possibly more. The vulnerability can be exploited by entering a malicious payload such as '><script>alert(1)</script>' into the 'Comment' field of the 'Form/Asset Repair/ARLOG-000015' page.

Recent Exploits: