header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Randshop SQL Injection Vulnerabilities

Randshop is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

PDJK-support Suite SQL Injection Vulnerabilities

The PDJK-support Suite is prone to multiple SQL injection vulnerabilities. These vulnerabilities could allow remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

ADC2000 NG Pro SQL Injection Vulnerabilities

The ADC2000 NG Pro application fails to properly sanitize user-supplied input before using it in an SQL query, which can lead to SQL injection vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

Netzbrett SQL Injection Vulnerability

Netzbrett is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

SQL Injection Vulnerability in ShockBoard

The ShockBoard application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application's input sanitization process, allowing an attacker to inject malicious SQL code into the 'offset' parameter of the '/topic.php' page. Successful exploitation of this vulnerability can lead to various security consequences, including compromising the application, unauthorized disclosure or modification of data, and exploitation of vulnerabilities in the underlying database implementation.

SQL Injection Vulnerabilities in edmoBBS

edmoBBS is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Kasseler CMS Multiple Vulnerabilities

Multiple vulnerabilities in Kasseler CMS allow for SQL injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF) attacks. The SQL injection vulnerability (CVE-2013-3727) allows remote authenticated administrators to execute arbitrary SQL commands. The XSS vulnerability can be exploited by tricking a logged-in administrator to visit a webpage with a CSRF exploit. The CSRF vulnerability can be used to perform DNS exfiltration on a Windows platform.

SQL Injection Vulnerabilities in K-Search

K-Search is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

AllWeb Search SQL Injection Vulnerability

AllWeb Search is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Recent Exploits: