header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

x10 Media Adult Script 1.7 Multiple Remote Vulnerabilities

x10 Media Adult Script 1.7 is vulnerable to multiple remote vulnerabilities such as SQL Injection, Blind SQL Injection and XSS. An attacker can exploit these vulnerabilities to gain access to sensitive information stored in the database, execute arbitrary SQL commands, and inject malicious scripts into the web page.

Miniweb 2.0 Module Survey Pro (bSQL/XSS) Multiple Remote Vulnerabilities

Miniweb 2.0 Module Survey Pro is vulnerable to Blind SQL Injection and XSS. An attacker can exploit this vulnerability by sending a malicious payload in the 'campaign_id' parameter of the 'index.php' page. For Blind SQL Injection, the attacker can send a payload like '1 and 1=2' to check if the query is true or false. For XSS, the attacker can send a malicious payload like '<script>alert(document.cookie)</script>' to execute the script in the victim's browser.

Miniweb 2.0 Module Publisher (bSQL/XSS) Multiple Remote Vulnerabilities

Miniweb 2.0 Module Publisher is vulnerable to Blind SQL Injection and XSS. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable parameter 'historymonth' in the URL. For Blind SQL Injection, the attacker can send a payload like 'historyyear=2009&historymonth=[BLIND]' and for XSS, the attacker can send a payload like 'historyyear=2009&historymonth=<script>alert('XSS')</script>'

Netpet CMS 1.9 (confirm.php language) Local File Inclusion Vulnerability

Netpet CMS 1.9 is vulnerable to a local file inclusion vulnerability due to insufficient sanitization of user-supplied input to the 'language' parameter in the 'confirm.php' script. An attacker can exploit this vulnerability to include arbitrary files from the web server, potentially leading to the execution of arbitrary code.

projectbutler – 1.5.0 (offset) RFI Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'offset' parameter of 'pda_projects.php' script. A remote attacker can send a specially crafted HTTP request with arbitrary file inclusion in the 'offset' parameter and execute arbitrary PHP code on the vulnerable system.

Recent Exploits: