header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Fullaspsite Shop Multiple Input Validation Issues

Fullaspsite Shop is prone to multiple input-validation issues, including multiple cross-site scripting issues and an SQL-injection issue, because the application fails to properly sanitize user-supplied input. A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

Fullaspsite Shop Multiple Input-Validation Issues

The Fullaspsite Shop application is prone to multiple input-validation issues, including multiple cross-site scripting issues and an SQL-injection issue. These vulnerabilities occur because the application fails to properly sanitize user-supplied input. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation.

Cross-Site Scripting in TaskFreak!

TaskFreak! is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

eWay Cross-Site Scripting Vulnerability

eWay is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Watermark Master v2.2.23 .wstyle Buffer Overflow (SEH)

This exploit targets a buffer overflow vulnerability in Watermark Master v2.2.23. By creating a malicious .wstyle file and placing it in the Video Styles folder, an attacker can cause the application to crash and potentially execute arbitrary code. The exploit takes advantage of a buffer overflow in the xmlstart variable, allowing the attacker to overwrite the next structured exception handler (nseh) and the subsequent structured exception handler (seh). The specific addresses used for the nseh and seh overwrite are provided in the code snippet. The exploit has been tested on Windows XP SP3.

TagIt! TagBoard Multiple Remote File Include Vulnerabilities

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

TagIt! TagBoard Multiple Remote File Inclusion Vulnerabilities

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

TagIt! TagBoard Remote File Include Vulnerability

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Recent Exploits: