header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Menu Creator plugin <= 1.1.7 SQL Injection Vulnerability

A SQL injection vulnerability exists in the WordPress Menu Creator plugin version 1.1.7 and earlier. The vulnerability is due to the updateSortOrder.php script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability to inject and execute arbitrary SQL commands in the application's back-end database.

WordPress Global Content Blocks plugin <= 1.2 SQL Injection Vulnerability

The vulnerability exists due to insufficient filtration of user-supplied input passed via the 'gcb' HTTP GET parameter to '/wp-content/plugins/global-content-blocks/gcb/gcb_export.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database.

WordPress Ajax Gallery plugin <= 3.0 SQL Injection Vulnerability

A SQL injection vulnerability exists in the WordPress Ajax Gallery plugin version 3.0 and below. An attacker can exploit this vulnerability by sending a crafted HTTP request to the list.php script with the delete and gId parameters set to a malicious value. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Exploit Title: Elgg 1.7.10 <= Multiple Vulnerabilities

XSS: A malicious user can inject a malicious script into the internalname parameter of the embed/media page. The script will be executed when the mouse is hovered over the page. SQL Injection: A malicious user can inject a malicious SQL query into the tag_names parameter of the search page.

WordPress WP Forum plugin <= 1.7.8 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in 'id' parameter of 'sendmail.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to disclose sensitive information, modify data, compromise the system, etc.

WordPress WP DS FAQ plugin <= 1.3.2 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in 'id' parameter of 'delete_faqbook' action in 'ajax.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass certain security restrictions, read/modify data in the database, compromise the system, etc.

Contrexx Shopsystem Blind SQL Injection Exploit

Contrexx Shopsystem is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The exploit is written in PHP and it takes the target URL, category ID and admin user limit as arguments. The exploit then uses the target URL and category ID to construct a malicious URL and sends it to the server. The malicious URL contains a blind SQL injection code which is used to extract the username and password of the admin user. The exploit then prints the username and password on the screen.

WordPress OdiHost Newsletter plugin <= 1.0 SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' and 'uid' parameters to '/wp-content/plugins/odihost-newsletter-plugin/includes/openstat.php' script. A remote attacker can execute arbitrary SQL commands in application's database.

WordPress Easy Contact Form Lite plugin <= 1.0.7 SQL Injection Vulnerability

A SQL injection vulnerability exists in WordPress Easy Contact Form Lite plugin version 1.0.7 and earlier. An attacker can exploit this vulnerability to inject arbitrary SQL commands via the 'field_num[]' parameter in the 'sort_row.request.php' script. This can be exploited to gain access to the database and potentially to gain access to the web server.

WordPress WP Symposium plugin <= 0.64 SQL Injection Vulnerability

A SQL injection vulnerability exists in WordPress WP Symposium plugin version 0.64. An attacker can send a malicious HTTP request to the vulnerable server, which can be used to execute arbitrary SQL commands in the back-end database. This can be exploited to manipulate or disclose sensitive information in the database.

Recent Exploits: