header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Iphone pointter Social network LFI Vulnerability

Apple Iphone Pointter is a PHP-based social network platform that lets you create a social network on your website. Right out of the box, your social network will offer nearly all of the features found on today's wildly popular social networks. An attacker can exploit this vulnerability by sending a crafted request to the vulnerable application with malicious input in the 'pid' parameter. This can lead to the disclosure of sensitive information from the server.

pointter Social network LFI Vulnerability

Pointter is a PHP-based social network platform that lets you create a social network on your website. Right out of the box, your social network will offer nearly all of the features found on today's wildly popular social networks. The vulnerability is a Local File Inclusion (LFI) vulnerability which allows an attacker to include local files on the server.

iScripts CyberMatch 1.0 Blind SQL Injection Vulnerability

A parameter is not properly sanitised before being used in a SQL query. The id parameter in profile.php is not properly sanitised before being used in a SQL query. That is not the query which selects the information about the user specified by the id parameter but is the query that selects the image's name. The affected query is a query of five fields. When the injected condition is true, in the page will be printed the real link to the personal image of the user specified by the id parameter, otherwise a link to bignophoto.gif.

iScripts ReserveLogic 1.0 SQL Injection Vulnerability

A numeric field is not properly sanitised before being used in a SQL query. The pid parameter in packagedetails.php is not properly sanitised before being used in a SQL query. Successful exploitation requires that the pid value exists in the database, or rather that is a real package id.

iScripts EasySnaps 2.0 Multiple SQL Injection Vulnerabilities

Some fields are not properly sanitised before being used in SQL queries. The comment parameter in add_comments.php is not properly sanitised before being used in a INSERT type SQL query. The values parameter in tags_details.php (search form) is not properly sanitised before used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "magic_quotes_gpc"" is disabled. There is a SQL injection that maybe may be exploited bypassing the internal filters in the begin parameter. The affected file is greetings.php."

Permanent XSS in InterScan Web Security Virtual Appliance 5.0

A permanent XSS vulnerability exists in InterScan Web Security Virtual Appliance 5.0. An attacker can send a specially crafted HTTP request with malicious JavaScript code to the vulnerable application in order to execute arbitrary code in the context of the user's browser. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

MadjiX.m3u Buffer Overflow

MadjiX.m3u Buffer Overflow is a vulnerability in the MadjiX.m3u file which allows an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error when handling the file, which can be exploited to cause a stack-based buffer overflow. By sending a specially crafted file to the vulnerable system, an attacker can overwrite the SEH handler and execute arbitrary code on the system.

Recent Exploits: