header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apple Mac OS X KHTMLParser Remote Denial of Service Vulnerability

Apple Mac OS X KHTMLParser is affected by a remote denial of service vulnerability. Successful exploitation may cause an application employing KHTMLParser to crash. KHTMLParser is used by Apple Safari Web browser and Apple TextEdit word processor.

Tangora Portal CMS Cross-Site Scripting Vulnerability

Tangora Portal CMS is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Cross-Site Scripting Vulnerability in SyntaxCMS

SyntaxCMS is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Multiple SQL Injection Vulnerabilities in QP7.Enterprise

QP7.Enterprise is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

QP7.Enterprise SQL Injection Vulnerabilities

QP7.Enterprise is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

phpSlash SQL Injection Vulnerability

An SQL injection vulnerability in phpSlash allows attackers to manipulate SQL queries by supplying malicious input, potentially leading to unauthorized access, data disclosure, or data modification. By exploiting this vulnerability, an attacker may also be able to exploit vulnerabilities in the database system used by phpSlash.

Papoo Multiple SQL-Injection Vulnerabilities

Papoo is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries. Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Recent Exploits: