header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! and Mambo ‘com_iigcatalog’ Component SQL Injection Vulnerability

The Joomla! and Mambo 'com_iigcatalog' component is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to a victim. The URL contains a malicious SQL query that can be used to access or modify data, or exploit latent vulnerabilities in the underlying database.

com_team Component for Joomla! and Mambo SQL Injection Vulnerability

The 'com_team' component for Joomla! and Mambo is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to a victim. The URL contains a malicious SQL query that can be used to access or modify data, or exploit latent vulnerabilities in the underlying database.

Facile Forms SQL Injection Vulnerability

Facile Forms is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

SQL Injection in PHP-Nuke Sections Module

The PHP-Nuke Sections module is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to a victim. The URL contains an SQL query that can be used to access or modify data, or exploit latent vulnerabilities in the underlying database.

SmarterMail HTML-injection Vulnerability

SmarterMail is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

Google Hack Honeypot File Upload Manager Unauthorized File Access Vulnerability

Google Hack Honeypot File Upload Manager is prone to an unauthorized file-access vulnerability. This issue occurs because the application fails to validate users before processing a certain HTTP request. Attackers can exploit this issue to delete all files that have been uploaded to the application.

Jinzora Multiple HTML-Injection and Cross-Site Scripting Vulnerabilities

Jinzora is prone to multiple HTML-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, and launch other attacks.

webcamXP Multiple Information Disclosure and Denial of Service Vulnerabilities

webcamXP is prone to multiple information-disclosure and denial-of-service vulnerabilities because it fails to check user-supplied input data. Attackers can exploit these issues to access potentially sensitive information or crash the application. Successful exploits could aid in further attacks or deny service to legitimate users.

Foxit WAC Remote Access Server Heap-Based Buffer Overflow Vulnerability

Foxit WAC Remote Access Server is prone to a heap-based buffer-overflow vulnerability. Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely cause denial-of-service conditions.

Recent Exploits: