header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MOJO’s IWMS <= 7 SQL Injection & Cross Site Scripting

A SQL injection attack consists of insertion or 'injection' of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.

SQL Injection Vulnerability in YES SOLUTIONS

SQL Injection vulnerability exists in YES SOLUTIONS which allows an attacker to inject malicious SQL queries into the vulnerable web application. This vulnerability can be exploited by sending malicious SQL queries to the vulnerable web application. The malicious SQL queries can be used to extract sensitive information from the database such as usernames and passwords. The vulnerable parameter is the ‘id’ parameter which can be exploited by sending malicious SQL queries to the vulnerable web application.

Newsletter Tailor Database Backup Dump Vulnerability

A vulnerability exists in Newsletter Tailor, a powerful Newsletter/ Mass Mailer script with built-in ftp client and wysiwyg editor, which allows an attacker to download the database backup from the target website. The vulnerability is due to the lack of authentication and authorization checks in the download.php file, which allows an attacker to download the backup.sql file without any authentication. The attacker can access the backup.sql file by accessing the URL http://[target].com/[path]/admin/download/backup.sql and can download the file by accessing the URL http://[target].com/[path]/admin/download/download.php?file=backup.sql.

Blue Dove Word Press Development

The vulnerability exists due to insufficient filtration of user-supplied input in 'Id' parameter in 'newsletter.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, gain access to sensitive data, modify data, etc.

Js tiny_mce/tiny_mce WYSIWYG{java script} vurnerebility xss–>popup

A Cross-site Scripting (XSS) vulnerability exists in TinyMCE, a JavaScript-based WYSIWYG editor, due to improper validation of user-supplied input. An attacker can leverage this vulnerability to execute arbitrary HTML and script code in a user's browser session in the context of the affected site. This vulnerability affects TinyMCE versions prior to 3.4.9.1, and is addressed in version 3.4.9.1.

Recent Exploits: