header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla Component prayercenter Remote SQL injection

A vulnerability exists in Joomla Component prayercenter, which allows an attacker to perform a Remote SQL injection attack. This is done by sending a maliciously crafted HTTP request to the vulnerable application. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database, such as usernames and passwords.

EasyWay CMS – SQL Injection Exploit

EasyWay CMS is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the admin panel and extract sensitive information from the database. This exploit was discovered by Lidloses_Auge and coded by the same. The exploit can be used by using a dork inurl:index.php?css=mid=art= and then using the exploit with the target URL and user ID as arguments. The exploit will then extract the login and password of the user from the database.

bp blog <= 6.0 Multiple Blind SQL Injection Vulnerability

bp blog is vulnerable to multiple blind SQL injection vulnerabilities. The vulnerability exists in the template_permalink.asp and template_archives_cat.asp files. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameters. This can allow the attacker to gain access to sensitive information from the database.

PassWiki Remote File Include Vulnerability

PassWiki is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

AzureSites CMS – Multiple Vulnerabilities

AzureSites CMS is vulnerable to multiple vulnerabilities, including SQL Injection and Insecure Cookie Handling. The count of columns for the SQL Injection could be different, and some of them are Blind Injections. For the Insecure Cookie Handling, the ID depends on the UserID, and the Admin Panel can be found at [Target]/azureadmin/index.php.

Social Site Generator SQL Injection Vulnerability

A SQL Injection vulnerability was discovered in Social Site Generator, which allows an attacker to gain access to the admin credentials. The vulnerability is caused due to the improper sanitization of user-supplied input to the 'sgc_id', 'scm_mem_id' and 'catid' parameters in the 'display_blog.php', 'social_my_profile_download.php' and 'social_forum_subcategories.php' scripts. An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameters. This can allow the attacker to gain access to the admin credentials.

Recent Exploits: