header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Rash CMS SQL Injection Vulnerability

A SQL injection vulnerability exists in Rash CMS due to improper sanitization of user-supplied input in the 'reciver' parameter of the 'contact-config.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request to the vulnerable script. This can allow the attacker to execute arbitrary SQL commands on the underlying database.

Advanced Image Hosting v2.2 SQLi Vulnerability

Advanced Image Hosting v2.2 is vulnerable to SQL injection. The vulnerable variables are the POST variables: gallery_id, showlinks, gal, id, type, email, emaillinks, allbox, and pages, as well as the GET variable. An attacker can exploit this vulnerability by sending malicious SQL queries to the application.

Anzeigenmarkt 2011 SQL Injection Vulnerability

Anzeigenmarkt 2011 is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to manipulate SQL queries by injecting arbitrary SQL code. This may allow the attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Registration Bypass SQL Injection Vulnerability

A SQL Injection vulnerability was discovered in ilch clan 1.0.5 a,b,c,d,e,f! in regist.php, which allows attackers to bypass the registration process. The vulnerability is caused by improper validation of user-supplied input in the $_POST parameter. An attacker can exploit this vulnerability to gain access to the application without registering.

XSRF/CSRF in Feng Office

The vulnerability exists due to failure in the users editing script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability.

XSS Vulnerability in InTerra Blog Machine

User can execute arbitrary JavaScript code within the vulnerable application. The vulnerability exists due to failure in the 'actions/add.php' script to properly sanitize user-supplied input in 'subject' variable. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

Super Multimedia Library 2.5.0 XSRF Vulnerability (Add Admin)

A Cross-Site Request Forgery (XSRF) vulnerability exists in Super Multimedia Library 2.5.0, which allows an attacker to add an admin user to the system. An attacker can craft a malicious HTML form and submit it to the vulnerable application, which will add the specified user to the system without any authentication.

Recent Exploits: