header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BM Classifieds (listingid),(ad)SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'listingid' and 'ad' parameters to the 'showad.php' and 'pfriendly.php' scripts. A remote attacker can execute arbitrary SQL commands in the application's database, compromise the application, access or modify data, exploit vulnerabilities in the underlying database and in certain cases gain access to the server.

QuickTicket Remote SQL Injection

QuickTicket is vulnerable to a remote SQL injection vulnerability due to insufficient sanitization of user-supplied input. The vulnerability exists in the qti_usr.php script, where the 'id' parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information from the database, such as user credentials.

XOOPS module wfdownloads SQL Injection

The vulnerability exists due to insufficient sanitization of user-supplied input in the 'cid' parameter of the 'viewcat.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel.

Lame ICQToolbar IE DoS – Crash IE and change toolbar color :p

This vulnerability allows remote attackers to cause a denial of service (crash) and change the color of the ICQToolbar in Internet Explorer. The vulnerability is due to a boundary error when handling a specially crafted GetPropertyById request. This can be exploited to cause a stack-based buffer overflow via an overly long string passed to the GetPropertyById method of the ICQToolbar ActiveX control (855F3B16-6D32-4FE6-8A56-BBB695989046).

XOOPS module glossaires SQL Injection

The vulnerability exists due to insufficient filtration of user-supplied data passed to the 'op' and 'sid' parameters in 'glossaires-p-f.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel.

Digital Security Research Group [DSecRG] Advisory #DSECRG-08-018

WEBrick Httpd server has directory traversal security vulnerability. WEBrick is an HTTP server library written in Ruby that uses servlets to extend its capabilities. Built into WEBrick are four servlets, handling CGI, ERb, file directories, and a generic Proc servlet. Ruby on Rails uses WEBrick as a quick and easy webserver to start developing your Rails applications. However, for whatever ease of development WEBrick adds to your application, it is generally considered not suitable for any production environment. The vulnerability is caused due to an input validation error in the WEBrick::HTTPServlet::FileHandler servlet when handling requests for files. This can be exploited to download arbitrary files from the server by sending a specially crafted HTTP request. Successful exploitation requires that the attacker knows the exact path of the file to be downloaded.

Mitra Informatika Solusindo cart Remote Sql Injection Exploit

A remote SQL injection vulnerability exists in Mitra Informatika Solusindo cart. An attacker can exploit this vulnerability to execute arbitrary SQL commands on the vulnerable system. This can be exploited to gain access to sensitive information stored in the database, modify data, or even execute system commands.

Recent Exploits: