header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpMyAdmin 2.6.3-pl1 Cross Site Scripting and Full Path Disclosure

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file.

JE CMS SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The request contains malicious SQL statements that are executed in the backend database. This can be done by appending the malicious SQL statement to the vulnerable parameter in the HTTP request. For example, http://localhost/[path]/index.php?jepage=viewcategory&categoryid=[sql] and http://localhost/index.php?jepage=viewcategory&categoryid=84+and+1=2+union+all+select+1,group_concat(username,0x3a,password),3,4,5,6+from+users--

Joomla Component com_event another sql injection vuln

The Attacker Can Exploit A SQL injection vuln in the following: The Sql injection query: index.php?option=com_event&task=view&id=-14 UnioN/**/SelECt 1,2,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),4-- Example: http://[site]/index.php?option=com_event&task=view&id=-14%20UnioN/**/SelECt%201,2,CONCAT_WS%28CHAR%2832,58,32%29,user%28%29,database%28%29,version%28%29%29,4--

MyNews v1.0 CMS – Sql Injection, local file inclusion and XSS Vulnerabilities

MyNews v1.0 CMS is vulnerable to Sql Injection, local file inclusion and XSS. The Sql Injection vulnerability is present in the 'article.php' file, where user-supplied input is not properly sanitized before being used in an SQL query. The local file inclusion vulnerability is present in the 'index.php' and 'admin.php' files, where user-supplied input is not properly sanitized before being used in an include statement. The XSS vulnerability is present in the 'admin.php' file, where user-supplied input is not properly sanitized before being used in an echo statement.

PHP-Fusion v4.01 SQL INJECTION Vulnerabilities

A SQL injection vulnerability exists in PHP-Fusion v4.01. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'news_id' parameter of the 'readmore.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database.

Recent Exploits: