header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL injection in Advanced comment system v1.0

PHP page internal/advanced_comment_system/admin.php in Advanced Comment System 1.0 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query, allowing remote attackers to execute the sqli attack via a URL in the 'page' parameter.

Dell OpenManage Network Manager Multiple Vulnerabilities

Dell OpenManage Network Manager exposes a MySQL listener that can be accessed with default credentials. This MySQL service is running as the root user, so an attacker can exploit this configuration to, e.g., deploy a backdoor and escalate privileges into the root account.

Electricks eCommerce 1.0 – Cross-Site Request Forgery (Change Admin Password)

Electricks eCommerce 1.0 is vulnerable to Cross-Site Request Forgery (CSRF) which allows an attacker to change the admin password. An attacker can craft a malicious HTML page containing a form with the necessary parameters to change the admin password. When the admin visits the malicious page, the form will be automatically submitted and the admin password will be changed.

SIPve 0.0.2-R19 – SQL Injection

SIPve 0.0.2-R19 is vulnerable to SQL injection. An attacker can inject malicious SQL queries via the 'usuario' and 'idgrupo' parameters in the 'monitorasocAcc.php' and 'getGrupoFuncionLoaded.php' scripts, respectively. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Webiness Inventory 2.3 – Arbitrary File Upload / Cross-Site Request Forgery Add Admin)

Webiness Inventory 2.3 is vulnerable to an arbitrary file upload and Cross-Site Request Forgery (CSRF) vulnerability which allows an attacker to upload a malicious file and add an admin user to the application.

Alive Parish 2.0.4 – SQL Injection / Arbitrary File Upload

Alive Parish 2.0.4 is vulnerable to SQL Injection and Arbitrary File Upload. An attacker can exploit this vulnerability by sending a malicious SQL query to the vulnerable parameter 'key' in the 'search' page. An attacker can also upload arbitrary files by sending a malicious POST request to the 'photo' page.

Recent Exploits: