header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pilot Cart 7.3 Remote SQL Injection Exploit

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application. This can be done by sending a malicious SQL query to the vulnerable parameter 'article' in the 'pilot.asp' script. An example of a malicious SQL query is '115+union+select+Name,Name,Name+from+msysobjects' or 'IIF((select%20mid(last(Name),1,1)%20from%20(select%20top%2010%20Name%20from%20MSysObjects))='a',0,'Bingo')%00'

Telephone Directory 2008 (SQL/XSS) Multiple Remote Vulnerabilities

Telephone Directory 2008 is vulnerable to SQL Injection and Reflected XSS. An attacker can exploit these vulnerabilities to gain access to the database and execute malicious scripts in the user's browser.

Real Estate Web Site 1.0 (SQL/XSS) Multiple Remote Vulnerabilities

Real Estate Web Site 1.0 is vulnerable to multiple remote vulnerabilities. An attacker can exploit these vulnerabilities to inject malicious SQL commands and execute arbitrary JavaScript code in the browser of an unsuspecting user. The vulnerable file is location.asp. An attacker can inject malicious SQL commands by sending a specially crafted HTTP request to the vulnerable file. An attacker can also inject arbitrary JavaScript code by sending a specially crafted HTTP request to the vulnerable file.

Joomla Component News Portal <= 1.0 Blind SQL Injection Exploit

Joomla Component News Portal version 1.0 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the admin credentials of the application. The vulnerability exists due to improper sanitization of user-supplied input in the 'Itemid' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable application. Successful exploitation of this vulnerability can allow an attacker to gain access to the admin credentials of the application.

Recent Exploits: