header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

India Software Solution Shopping Cart SQL Injection Vulnerability

India Software Solution Shopping Cart is prone to an SQL injection vulnerability. This vulnerability could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.

ServersCheck Directory Traversal Vulnerability

ServersCheck is affected by a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to disclose arbitrary files on an affected computer in the context of the affected application. This may aid in further attacks against the underlying system.

Hosting Controller Multiple Vulnerabilities

Hosting Controller is reported to be prone to multiple vulnerabilities, which can allow an attacker to gain unauthorized access to data and carry out SQL injection attacks. These issues reportedly affect Hosting Controller 6.1 HotFix 2.0 and prior versions.

os4e SQL Injection Vulnerability

os4e is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'login.asp' script before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

NPDS Multiple Vulnerabilities

NPDS is affected by multiple vulnerabilities resulting from input validation errors. These issues may allow remote attackers to carry out HTML injection, cross-site scripting and SQL injection attacks. This may result in the theft of authentication credentials, destruction or disclosure of sensitive data, and potentially other attacks.

Simplog 0.9.3.1 Remote SQL Injection Vulnerability

Simplog 0.9.3.1 is vulnerable to a remote SQL injection vulnerability. This vulnerability requires at least one blog entry to be made prior to injection. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This will allow the attacker to gain access to the login credentials of the administrator.

Recent Exploits: