header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BST – BestShopPro (nowosci.php) Multiple Vulnerabilities

The vulnerability exists in the nowosci.php page, which allows an attacker to inject malicious JavaScript code, HTML code, and SQL queries. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious code to the vulnerable page.

Oracle Hyperion Financial Management TList6 ActiveX Control Remote Code Execution Vulnerability

The mentioned class contains the vulnerable SaveData() method, which allows to create / overwrite files with arbitrary extensions inside arbitrary locations ex. automatic startup folders. By manipulating ex. the Caption property is possible to create a valid application with .hta extension.

ZTE ZXDSL 831IIV7.5.0a_Z29_OV Multiple vulnerabilities

To bypass authentication, the attacker can go to URL http://192.168.1.1/accessaccount.cgi. To get request forgery, the attacker can request from his browser without cookie or any authentication, or send link to the Administrator. The script revealing sensitive information on source of page 'accessaccount.cgi' reveals the default credentials for both user and admin accounts.

jbShop – e107 v7 CMS plugin – SQL Injection vulnerability

A SQL Injection vulnerability exists in jbShop - e107 v7 CMS plugin, which allows an attacker to execute arbitrary SQL commands via the item_id parameter. An attacker can exploit this vulnerability by sending a malicious HTTP request to the vulnerable server with a crafted item_id parameter. This will allow the attacker to gain access to sensitive information such as user credentials.

WordPress WP Glossary plugin SQL Injection Vulnerability

Discovered a vulnerability in WP Glossary, Wordpress Plugin, vulnerability is SQL injection. File: wp-content/plugins/wp-glossary/ajax.php Exploit: id=-1; or 1=if Exploitation: http://localhost:80/wp-content/plugins/wp-glossary/ajax.php [GET][id=-1][CURRENT_USER() http://localhost:80/wp-content/plugins/wp-glossary/ajax.php [GET][id=-1][SELECT (CASE WHEN ((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END) http://localhost:80/wp-content/plugins/wp-glossary/ajax.php [GET][id=-1][MID((VERSION()),1,6)

WordPress Classipress Theme <= 3.1.4 Stored XSS

ClassiPress is a popular and widely used classified ads software for WordPress. Classipress is vulnerable to multiple stored XSS vulnerabilities. Input through the POST parameters 'facebook_id' and 'twitter_id' in a registered user's profile page is either not sanitisized or poorly sanitised (version specific) allowing the attacker to insert Javascript code. In version 3.0.5.2 and presumably all previous versions, no sanitation is in place, allowing an attacker to insert code within a tag or to break out of it. In version 3.1.4, the less-than character is sanitised but an attacker can still insert quotes and place an event handler in the tag.

Joomla Compenent com_hmcommunity Multiple Vulnerabilities

The SQL vulnerability is an injection vulnerability that can be exploited by sending a maliciously crafted HTTP request to the vulnerable application. The Blind SQL vulnerability is an injection vulnerability that can be exploited by sending a maliciously crafted HTTP request to the vulnerable application. The Persistent XSS vulnerability is an injection vulnerability that can be exploited by creating an account and putting malicious code in the inputs. The demo for this vulnerability is to create an account and look at the profile of the user with the ID 155.

Recent Exploits: