header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ASPKnowledgeBase Cross-Site Scripting Vulnerability

ASPKnowledgeBase is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

DuPortalPro Cross-Site Scripting Vulnerability

DuPortalPro is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

HTML Injection Vulnerability in Horde IMP

Horde IMP is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.Reports indicate this issue is only present when viewing IMP content with the Microsoft Internet Explorer Web browser.

Multiple SQL Injection Vulnerabilities in Blog System

The Blog System is vulnerable to multiple SQL injection attacks. These vulnerabilities occur due to the application's failure to properly sanitize user-supplied input before using it in SQL queries. An attacker can exploit these vulnerabilities by injecting malicious SQL code through the 'cat' parameter in the 'index.php' page.

Directory Traversal Vulnerability in Portal Solutions

Portal Solutions is prone to a directory traversal vulnerability. This is due to a lack of proper sanitization of user-supplied input. This issue may be leveraged to read arbitrary files on an affected computer with the privileges of the Web server. An attacker can employ directory traversal sequences to disclose arbitrary files.

Affiliate Manager PRO SQL Injection Vulnerability

The Affiliate Manager PRO application fails to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting SQL code into the 'pid' parameter in the 'ViewPaymentLog' function of the 'functions.php' file. Successful exploitation could lead to unauthorized access, disclosure or modification of data, or exploitation of other vulnerabilities in the underlying database.

SQL Injection Vulnerability in Portal Solutions

Portal Solutions is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Multiple SQL Injection Vulnerabilities in eDating Professional

eDating Professional is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

eDating Professional Multiple SQL Injection Vulnerabilities

The eDating Professional application is prone to multiple SQL injection vulnerabilities. These vulnerabilities occur due to a lack of proper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit these vulnerabilities to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

Recent Exploits: