header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Interactivefx.ie CMS SQL Injection Vulnerability

Interactivefx.ie CMS is vulnerable to SQL Injection. An attacker can exploit this vulnerability to bypass authentication in the admin panel by using the login 'or 1=1/*' and any password. Additionally, an attacker can exploit this vulnerability to extract sensitive information from the database by using the URL http://server/event-details.php?id=223'+select+username,password+from+users/*

Vbulletin Blog 4.0.2 XSS Vulnerability

The script is affected by Permanent XSS vulnerability, so you can put in bad java script code <script>alert('put this script in title')</script> <meta http-equiv='Refresh' content='0;URL=http://db-exploit.com'> 1st register, Go to Blogs page, Create New Post, Inject your java script into Title Box, You must go back to Main page to see this XSS effect.

Joomla Component com_wallpapers SQL Injection Vulnerability

An attacker can exploit this vulnerability by sending a specially crafted SQL query to the vulnerable parameter 'cid' of the 'com_wallpapers' component. This can be done by appending a malicious SQL query to the vulnerable parameter, for example: http://127.0.0.1/index.php?option=com_wallpapers&act=albums&cid=-1+UNION+SELECT+1--

E-php CMS SQL Injection Vulnerability

E-php CMS is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Easy-Clanpage <= v2.0 Blind SQL Injection Exploit

Easy-Clanpage is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information. This exploit is possible by sending a specially crafted HTTP request to the vulnerable application. The exploit code is written in Python and can be used to extract the password of a user from the database.

Recent Exploits: