header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BerliOS SourceWell SQL Injection Vulnerability

The BerliOS SourceWell application is prone to an SQL injection vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

Softbiz Resource Repository Script SQL Injection Vulnerabilities

Softbiz Resource Repository Script is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Nelogic Nephp Publisher SQL Injection Vulnerabilities

The Nelogic Nephp Publisher application is prone to SQL injection vulnerabilities. These vulnerabilities occur due to a lack of proper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit these vulnerabilities to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

SQL injection vulnerabilities in Bedeng PSP

Bedeng PSP is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Bedeng PSP SQL Injection Vulnerabilities

Bedeng PSP is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Multiple SQL Injection Vulnerabilities in PHPWordPress

PHPWordPress is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

SQL Injection Vulnerabilities in Top Music Module for PHP-Nuke

The Top Music Module for PHP-Nuke is prone to SQL injection vulnerabilities. These vulnerabilities occur when user-supplied input is not properly sanitized before being used in SQL queries. An attacker can exploit these vulnerabilities by injecting malicious SQL code into the 'idartist' and 'idsong' parameters in the '/modules.php?name=topMusic' URL. Successful exploitation could lead to compromise of the application, disclosure or modification of data, or exploitation of vulnerabilities in the underlying database implementation.

Babe Logger SQL Injection Vulnerability

Babe Logger is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Enterprise Connector SQL Injection Vulnerability

The Enterprise Connector application is prone to SQL injection vulnerabilities. These vulnerabilities occur when the application fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by sending a specially crafted request to the '/send.php' endpoint with a malicious SQL payload in the 'messageid' parameter. Successful exploitation of this vulnerability could lead to compromise of the application, disclosure or modification of data, or allow the attacker to exploit vulnerabilities in the underlying database implementation.

Buffer Overflow Vulnerability in ‘unalz’ Utility

The 'unalz' utility is prone to a buffer-overflow vulnerability. This issue is exposed when the application extracts an ALZ archive that contains a file with a long name. An attacker could exploit this vulnerability to execute arbitrary code in the context of the user who extracts a malicious archive.

Recent Exploits: