header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Input Validation Vulnerabilities in PhotoPost Pro

Multiple input validation vulnerabilities affect PhotoPost Pro. These include cross-site scripting vulnerabilities in 'slideshow.php', 'showgallery.php', and 'showmembers.php' scripts, as well as SQL injection vulnerabilities in 'showmembers.php' and 'showphoto.php' scripts. These vulnerabilities occur due to the application's failure to properly sanitize user-supplied input.

Cross-Site Scripting Vulnerability in Topic Calendar

The Topic Calendar application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability by injecting arbitrary script code into the browser of a victim user, potentially leading to the theft of authentication credentials and other attacks.

Webid Blind SQL Injection / Local File Disclosure Vulnerability

The vulnerability exists in the '/yourauctions_p.php' file of the WeBid auction script package. The code snippet starting from line 29 allows an attacker to perform blind SQL injection by manipulating the '$_POST['startnow']' parameter. This can lead to unauthorized access to the database or disclosure of sensitive information. Additionally, the code snippet does not properly sanitize user input, which could result in local file disclosure.

Craigslist Clone Gold SQL injection Vulnerability

This exploit allows an attacker to perform SQL injection on the Craigslist Clone Gold script. By manipulating the 'view' parameter in the URL, an attacker can execute arbitrary SQL queries and retrieve sensitive information from the database. The specific payload used in the exploit is '-1 union select concat(email,0x3a,code) from clf_ads--'.

Denial of Service vulnerability in Spinworks Application Server

A remote denial of service vulnerability affects Spinworks Application Server. This issue is due to a failure of the application to properly handle malformed requests. An attacker may leverage this issue to trigger a denial of service condition in the affected software.

Recent Exploits: