header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BtiTracker/xBtiTracker Remote SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The attacker can use the UNION operator to combine the results of two or more SELECT statements into a single result set which is then returned to the attacker. This can be used to gain access to the application's database and potentially gain access to sensitive information.

MiaCMS <= 4.6.5 SQL Injection Vulnerability

MiaCMS is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to the administrator account. Exploits 1, 2 and 3 can be used to gain access to the administrator account. Additionally, the administrator password is stored in plaintext in the source code of the page.

XSS / Remote SQL Injection

Five Star Review ( recommend.php item_id ) is vulnerable to XSS and Remote SQL Injection. User Exploite >> www.TraGet.com/recommend.php?item_id=1'+union+select+0,concat_ws(0x3a,username,passtext),0,concat_ws(0x3a,username,passtext),0,0,0,0,0,0,0+from+review_users+limit+1,1/* and Admin Exploite >> www.TraGet.com/recommend.php?item_id=1'+union+select+0,concat_ws(0x3a,username,passtext),0,concat_ws(0x3a,username,passtext),0,0,0,0,0,0,0+from+review_admin/*. XSS can be exploited by using www.TraGet.com/search/index.php?cmd=search&words= [[ XSS ]] &searchWhere=0&mode=normal.

OneNews Beta 2 Multiple Vulnerabilities

The OneNews Beta 2 application is vulnerable to XSS and HTML injection and SQL injection. To exploit the XSS and HTML injection vulnerability, an attacker can inject malicious code into the forms while adding comments or news. To exploit the SQL injection vulnerability, an attacker can inject malicious code into the address bar.

EasySite v2.3 Multiple Remote Vulnerabilities

EasySite v2.3 is vulnerable to Local File Inclusion and Arbitrary View Folder Contents. An attacker can exploit this vulnerability by sending maliciously crafted HTTP requests to the vulnerable server. This will allow the attacker to view the contents of the folder and the content of files view via LFI.

tinyCMS 1.1.2 (templater.php) Local File Inclusion Vulnerability

tinyCMS 1.1.2 is vulnerable to a Local File Inclusion vulnerability due to a lack of sanitization of user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files on the server, such as the /etc/passwd file, by supplying a maliciously crafted value for the 'config[template]' parameter in a request to the 'templater.php' script.

BandSite CMS 1.1.4 Arbitrary Download Database/XSS/CSRF

Go to http://localhost/[Path]/adminpanel/phpmydump.php and the download will begin ( database.sql ). For XSS, http://localhost/[Path]/merchandise.php?type=[XSS] or http://localhost/[Path]/merchandise.php?type=<script>alert(document.cookie)</script>. For CSRF, if a logged in user with administrator privilegies click the following url he will be logged out http://localhost/[Path]/adminpanel/logout.php.

Authentication Bypass SQL Injection

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'email' and 'password' parameters to '/_login.php' script. A remote attacker can send a specially crafted request with malicious SQL statements to the vulnerable script and bypass authentication, gain access to the application with administrative privileges and execute arbitrary SQL commands in the context of the application.

CCMS Gaming Portal SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in 'id' parameter of 'print.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. Successful exploitation of this vulnerability may allow an attacker to gain access to sensitive information stored in the database.

Recent Exploits: