USupport 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to the database and execute arbitrary SQL commands.
UStore 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to sensitive information stored in the database, such as usernames and passwords.
Tritanium Bulletin Board is prone to multiple cross-site scripting vulnerabilities due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This exploit allows an attacker to inject malicious SQL commands into the vulnerable ASPPortal application. The exploit is triggered when the attacker submits a malicious input to the 'field1' parameter of the 'exploit1.asp' page. This can be used to gain access to the application's database and potentially gain access to sensitive information.
Munch Pro 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the application's database and potentially gain access to sensitive information.
Rama CMS version 0.68 is vulnerable to a Local File Include vulnerability. This vulnerability is due to the 'lang' cookie not being properly sanitized before being used in a file include call. An attacker can exploit this vulnerability to include arbitrary local files from the web server, which can lead to the disclosure of sensitive information.
NuSchool 1.0 (CampusNewsDetails.asp) is vulnerable to a remote SQL injection attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This will allow the attacker to gain access to the application's database and extract sensitive information such as usernames and passwords.
NuStore 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The vulnerable parameter is the ‘SubCatagoryID’ parameter which is located in the ‘Products.asp’ page. An attacker can inject arbitrary SQL code into the vulnerable parameter and execute it in the back-end database.
NuRems 1.0 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. This can allow an attacker to gain access to sensitive information such as usernames, passwords, and emails.
NuCommunity 1.0 is vulnerable to a remote SQL injection vulnerability. This vulnerability allows an attacker to gain access to the admin credentials of the application. The exploit is triggered by sending a specially crafted HTTP request to the vulnerable application. The request contains a malicious SQL query which is executed in the backend database.