header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VirtueMart Google Base Component 1.1 Remote File Inclusion Vulnerability

VirtueMart Google Base Component 1.1 is vulnerable to a Remote File Inclusion vulnerability. This vulnerability is due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from remote hosts and execute arbitrary code on the vulnerable system.

Multi Languages WebShop Online (name:XSS|id:SQLi) Multiple Remote Vulnerabilities

Multi Languages WebShop Online is vulnerable to SQL Injection and Cross-Site Scripting (XSS). An attacker can exploit these vulnerabilities to gain access to sensitive information such as usernames and passwords, or to execute malicious scripts in the user's browser.

TBmnetCMS v1.0 (index.php?content) Local File Inclusion Vulnerability

TBmnetCMS v1.0 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to view sensitive files on the server, such as the /etc/passwd file. The vulnerability is due to the application not properly sanitizing user-supplied input to the 'content' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to view sensitive files on the server, such as the /etc/passwd file.

pppBlog <= 0.3.11 (randompic.php) System File Disclosure Vulnerability

pppBlog version 0.3.11 and below is vulnerable to system file disclosure due to improper input validation. An attacker can exploit this vulnerability to read arbitrary files from the server. The vulnerable code is present in randompic.php at lines 66-72. The PoC for this vulnerability is randompic.php?files[0]=[file] and randompic.php?files[0]=../../../../../../../../../../etc/passwd. This exploit was tested on localhost with register_globals = On.

MatPo Link 1.2b Blind Sql Inj / XSS

The MatPo Link 1.2b script is vulnerable to Blind SQL Injection and Cross Site Scripting. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable script. This can allow an attacker to gain access to sensitive information from the database or execute malicious scripts in the user's browser.

MatPo Link Version 1.2 Beta Remote Sql inj.

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can inject malicious SQL queries in the vulnerable parameter and execute arbitrary SQL commands in the back-end database. This can be used to bypass authentication, access, modify and delete data within the database.

Recent Exploits: