header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SFS Home Business Directory SQL Injection Vuln.

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'cat_id' parameter to '/directory.php' script. A remote attacker can execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit latent vulnerabilities in the underlying database and compromise the system.

Insecure Cookie Handling Vulnerability

A vulnerability in Absolute Newsletter 6.1 allows an attacker to set an arbitrary cookie value. By setting the cookie value to 'lvl=1&userid=1&usr=admin&s=TYPE A SERIES OF RANDOM NUMBERS AND CHARACTERS HERE; path=/' and navigating to /menu.aspx, an attacker can gain administrative access to the application.

SQL Injection in showcategory.php

The vulnerability is caused due to the user input passed to the 'cid' parameter in 'showcategory.php' script not being properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation may allow an attacker to gain access to the affected application, disclose sensitive information from the database, modify data, etc.

A-Link WL54AP3 and WL54AP2 CSRF+XSS vulnerability

A-Link WLAN54AP3 does not validate the origin of an HTTP request. If attacker is able to make user view malicious content, the WLAN54AP3 device can be controlled by submitting malicious HTTP requests. This is possible because the device does not require authentication for administrative requests. In addition, no input validation or output encoding is performed in management interface, thus making it vulnerable to cross-site scripting.

U-Mail Webmail Arbitrary File Write Vulnerability

This vulnerability allows remote attackers to write arbitrary file on vulnerable installations of U-Mail Webmail Server. Authentication is required to exploit this vulnerability.The specific flaw exists in the 'edit.php' file running on the U-Mail Webmail Server. A malicious HTTP POST request can write arbitrary file to the publicly accessible web directories.

Cpanel 11.x

Local File Inclusion vulnerability can be exploited by renaming a shell to config.php and uploading it to the ./ directory. Cross Site Scripting can be exploited by setting the action parameter to Upgrade%20to%201.7.4 and exploiting the vulnerable variables such as $localapp, $updatedir, $scriptpath_show, $domain_show, $thispage, $thisapp, and $currentversion.

Logz podcast CMS version 1.3.1 Remote sql inj

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request should contain a malicious SQL query in the ‘art’ parameter. This malicious query will be executed in the backend database, allowing the attacker to gain access to sensitive information such as usernames and passwords.

Recent Exploits: