header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

iHTML Merchant SQL Injection Vulnerability

The iHTML Merchant application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL statements into the 'id' or 'pid' parameters of the affected URLs. Successful exploitation of this vulnerability could result in compromising the application, disclosure or modification of data, or exploitation of vulnerabilities in the underlying database implementation.

iHTML Merchant Mall SQL Injection Vulnerability

The iHTML Merchant Mall application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application's input sanitization process. An attacker can exploit this vulnerability by injecting malicious SQL queries through the 'id' and 'step' parameters in the URL. Successful exploitation of this vulnerability could lead to unauthorized access, data disclosure, data modification, or further exploitation of vulnerabilities in the underlying database implementation.

ezDatabase Multiple Input Validation Vulnerabilities

ezDatabase is prone to an SQL injection vulnerability and a local file include vulnerability. Successful exploitation of these issues may result in the disclosure of sensitive information, a compromise of the database or the execution of arbitrary local server-side script code. This may facilitate a compromise of the underlying system; other attacks are also possible.

Cross-Site Scripting Vulnerability in Kryptronic ClickCartPro

Kryptronic ClickCartPro is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Cross-Site Scripting Vulnerability in PPCal Shopping Cart

PPCal Shopping Cart is vulnerable to cross-site scripting (XSS) due to improper input sanitization. An attacker can execute arbitrary script code in the browser of an unsuspecting user within the affected site's context. This can lead to the theft of cookie-based authentication credentials and enable further attacks.

Cross-Site Scripting Vulnerability in ECTOOLS Onlineshop

The ECTOOLS Onlineshop is vulnerable to cross-site scripting (XSS) attacks. This vulnerability arises from the lack of proper input sanitization in the application. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected site, leading to the execution of malicious scripts in the browsers of unsuspecting users. This can result in the theft of authentication credentials and other potential attacks.

Multiple Cross-Site Scripting Vulnerabilities in ECW-Cart

ECW-Cart is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Cross-Site Scripting Vulnerability in eDatCat

eDatCat is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Multiple Cross-Site Scripting Vulnerabilities in AtlantForum

AtlantForum is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Recent Exploits: