header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AJ Auction All Version (subcat.php) Remote BLIND SQL Injection Exploit

This exploit allows an attacker to perform a blind SQL injection attack on the AJ Auction All Version subcat.php script. By manipulating the 'cate_id' parameter, the attacker can retrieve sensitive information from the database, such as usernames and passwords.

Cross-Site Scripting Vulnerability in Sniggabo CMS

Sniggabo CMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

PHP City Portal Cross-Site Scripting Vulnerability

PHP City Portal is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Arbitrary File Upload in TCExam

The TCExam application fails to adequately sanitize user-supplied input, allowing attackers to upload arbitrary files. By exploiting this vulnerability, an attacker can upload arbitrary code and execute it in the context of the webserver process. This can lead to unauthorized access, privilege escalation, and other attacks.

Cross-Site Scripting in Hexjector

Hexjector is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

SQL Injection vulnerability in com_sar_news component for Joomla!

The 'com_sar_news' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Cross-Site Scripting in Datetopia Match Agency BiZ

The Datetopia Match Agency BiZ application is prone to multiple cross-site scripting vulnerabilities due to improper sanitization of user-supplied input. An attacker can exploit these vulnerabilities to execute arbitrary script code in the context of an unsuspecting user's browser. This can lead to the theft of authentication credentials and facilitate further attacks.

Asterisk SIP Killer

This exploit causes Asterisk to segfault by sending a specially crafted REGISTER request. The bug that this exploit targets has been patched in release 1.2.16 and 1.4.1. The exploit sends a REGISTER request with specific headers and causes a segmentation fault in the register_verify function in chan_sip.c.

Multiple Cross-Site Scripting Vulnerabilities and Cross-Site Request Forgery Vulnerability in CMS Made Simple

CMS Made Simple is prone to multiple cross-site scripting vulnerabilities because the software fails to sufficiently sanitize user-supplied inputs. The application is also prone to a cross-site request-forgery vulnerability.An attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.The attacker can exploit the cross-site request-forgery issue by tricking a victim into following a specially crafted HTTP request designed to perform some action on the attacker's behalf using a victim's currently active session.

Recent Exploits: