header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Prestashop 1.7.7.0 – ‘id_product’ Time Based Blind SQL Injection

Prestashop 1.7.7.0 is vulnerable to Time Based Blind SQL Injection. The vulnerability exists in the 'id_product' parameter of the 'CommentGrade' controller of the 'productcomments' module. An attacker can exploit this vulnerability by sending a specially crafted payload to the vulnerable parameter. The payload used in this exploit is '1 AND (SELECT 3875 FROM (SELECT(SLEEP(5)))xoOt)'. This payload will cause the server to sleep for 5 seconds, indicating a successful exploitation of the vulnerability.

WordPress Plugin Custom Global Variables 1.0.5 – ‘name’ Stored Cross-Site Scripting (XSS)

A stored XSS vulnerability exists in WordPress Plugin Custom Global Variables 1.0.5, which allows an attacker to inject malicious JavaScript code into the 'name' field of the plugin. An attacker can exploit this vulnerability by entering a malicious JavaScript payload into the user input field, which is then stored in the database. When the same functionality is triggered, the malicious JavaScript payload is executed, resulting in a pop-up.

Anchor CMS 0.12.7 – ‘markdown’ Stored Cross-Site Scripting

Exploitation of vulnerability as shown below; 1-) Entering the Admin Panel ( vulnerableapplication.com/anchor/admin ) 2-) Click Create a new post button at the Posts tab ( From "vulnerableapplication.com/anchor/admin/posts " to "vulnerableapplication.com/anchor/admin/posts/add " ) 3-) Relevant payload (<script>prompt("RMG_XSS_PoC")</script>) which was defined above entering the markdown parameter then click "save" button 4-) Finally, turn back the home page then shown the triggered vulnerability

Cockpit Version 234 – Server-Side Request Forgery (Unauthenticated)

Cockpit Version 234 is vulnerable to Server-Side Request Forgery (Unauthenticated) vulnerability. An attacker can exploit this vulnerability to scan internal or loopback interface of the server. The attacker can also scan for open ports on the server. This vulnerability can be exploited without authentication.

Recent Exploits: