header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ASPPortal SQL Injection Vulnerability

ASPPortal is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

WordPress Cart66 Plugin 1.5.1.14 Multiple Vulnerabilities

Two vulnerabilities were discovered in the Wordpress plugin Cart66 version 1.5.1.14. The first vulnerability is a Cross-Site Request Forgery (CSRF) vulnerability that allows an authenticated Wordpress admin user to unknowingly add a product or alter an existing product on the site. The second vulnerability is a Stored XSS vulnerability that allows an attacker to inject malicious code into a vulnerable field.

Bitweaver SQL Injection and Cross-Site Scripting Vulnerabilities

Bitweaver fails to sanitize user-supplied data, leading to SQL injection and cross-site scripting vulnerabilities. Exploiting these vulnerabilities can result in the theft of authentication credentials, compromise of the application, unauthorized access or modification of data, and exploitation of latent vulnerabilities in the database implementation.

sendtemp.pl File Disclosure Vulnerability

A vulnerability in the Amaya Web development server allows remote read access to files on the server's file system. By passing a malicious `templ` argument to the sendtemp.pl script, an attacker can traverse the file system and read files, such as the passwd file. This vulnerability occurs due to lack of input sanitization on the `templ` parameter.

DataWizard FtpXQ Server Multiple Remote Vulnerabilities

The DataWizard FtpXQ Server is prone to multiple remote vulnerabilities. The first vulnerability is a remote denial-of-service issue that occurs when the application fails to perform adequate bounds checks on user-supplied data before copying it to an insufficiently sized buffer. This can be exploited by an attacker to crash the application, denying access to legitimate users. The second vulnerability is due to the application creating two testing accounts by default. An attacker can access these accounts to gain read/write privileges on the server, potentially compromising the affected computer.

Recent Exploits: