header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection in EL CMS

A SQL injection vulnerability was discovered in the Entry Level Content Management System (EL CMS). An attacker can exploit this vulnerability by sending malicious SQL queries to the vulnerable web application. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. This can allow an attacker to gain access to the database and extract sensitive information.

IMEDIA (index.php) SQL Injection Vulnerability

IMEDIA (index.php) SQL Injection Vulnerability is a vulnerability that allows an attacker to inject malicious SQL code into an application, allowing them to access, modify, or delete data from the database. This vulnerability was discovered by Kannibal615 in 2010 and affects all versions of the software. The exploit is triggered by using a specially crafted DORK (Powered by: Con-Imedia) and sending a malicious HTTP request to the target. The malicious code is then executed, allowing the attacker to gain access to the database.

DBCart (article.php) SQL Injection Vulnerability

A vulnerability exists in DBCart ONLINE SHOPPING APPLICATION, which allows an attacker to inject arbitrary SQL commands. An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable application using the 'id' parameter. This can result in the manipulation of the underlying database and the disclosure of sensitive information.

Palo Alto Network Vulnerability – Cross-Site Scripting (XSS)

A Stored Cross-Site Scripting (XSS) vulnerability was found within the Palo Alto interface. By crafting a URL that includes XSS code it is possible to inject malicious data, redirect the user to a bogus replica of the real website, or other nefarious activity.

Web Administration Broken Access Control in McAfee Email Gateway (formerly IronMail)

Ironmail was found to allow Web Access users to execute arbitrary actions with Write rights, due to an improper profile check.

Google Chrome 4.1.249.1059 Cross Origin Bypass in Google URL (GURL)

The Google URL Parsing Library (aka google-url or GURL) in Google Chrome before 4.1.249.1064 allows remote attackers to bypass the Same Origin Policy via CHARACTER TABULATION or others escape characters inside javascript: protocol string.

Battle Scrypt Shell Upload Vulnerability

A remote file upload vulnerability exists in Battle Scrypt, which allows an attacker to upload a malicious file to the server. The attacker can then access the malicious file by accessing the URL /images/uploads/[id].php. This vulnerability can be exploited by using the d0rk 'Powered by Battle Scrypt' or inurl:upload.php.

Recent Exploits: