header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JForum 2.1.8 bookmarks CSRF & XSS

If the victim is authenticated then it is possible via a number of methods to have the vicitim visit the below example url. A new bookmark entry would be set and the XSS payload inserted and would be triggered when the user visited their bookmarks page. It is also possible to pre-load your own bookmarks page and if another user visits your bookmarks then the payload would also be executed.

reVou twitter clne Beta 2.0 sqli and Xss vulnerability

Existing site owners can benefit from running a micro blogging service resulting in more viral growth for your website when your users interact with follow friends by receiving updates via our social network platform. With our SMS integration as well as custom API, we allow you to gain more revenues through purchase of SMS credits, revenues from web advertisements and as well benefiting from 3rd party applications built for your site using our API. To exploit the vulnerability, attackers can use ' or 1=1 or ''=' to login and <script>alert(document.cookie)</script> for XSS.

WebBiblio Subject Gateway System Local File Inclusion Vulnerability

WebBiblio Subject Gateway System is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to include arbitrary local files from the target server.

Joomla Component com_annonces Upload Vulnerability

A vulnerability in the Joomla Component com_annonces allows an attacker to upload arbitrary files, including malicious PHP files, which results in arbitrary remote code execution. This vulnerability is due to insufficient validation of the file type being uploaded. An attacker can exploit this vulnerability by uploading a malicious PHP file with a double extension such as “file.php.jpg”.

PHP car rental complete System V1.2 SQli vulnerability

PHP Car Rental-Script suffers from a SQL Injection vulnerability which allows an attacker to execute arbitrary SQL commands on the vulnerable system. The vulnerability is present in the 'group.php' script, where the 'id' parameter is not properly sanitized before being used in a SQL query.

iScripts easybiller v1.1 sqli vulnerability

iScripts EasyBiller billing software is an easy way to automate and manage your businesses. iScripts EasyBiller, combined with an integrated helpdesk delivers a powerful, easy-to-use, integrated business solution. SQL injection is found in the easybiller script V1.1. The exploit can be found at http://[url]/easybiller/demo/viewhistorydetail.php?planid=[Sqli].

iScripts eSwap v2.0 sqli and xss vulnerability

iScripts eSwap version 2.0 is vulnerable to an SQL injection vulnerability and a cross-site scripting vulnerability due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability by sending malicious SQL queries to the application, which can be used to gain access to sensitive information stored in the database. Additionally, an attacker can exploit the cross-site scripting vulnerability by injecting malicious JavaScript code into the application, which can be used to steal user credentials or perform other malicious activities.

XSS, SQL injection vulnerability in WmsCMS

Input passed via the "search","sbr","pid","sbl","FilePath" parameters to default.asp is not properly sanitised before being used in a SQL query. Input passed via the "sbr","pr","psPrice" parameters to printpage.asp is not properly sanitised before being used in a SQL query. Input passed to the "search","sbr","p","sbl" parameters in default.asp is not properly sanitised before being returned to the user.

Recent Exploits: