header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GhostScripter Amazon Shop SQL Injection Vulnerability

GhostScripter Amazon Shop is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

SQL Injection Vulnerabilities in BosDates

BosDates is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

SQL Injection vulnerabilities in Entergal MX

Entergal MX is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

DMANews SQL Injection Vulnerabilities

DMANews is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Fantastic News SQL Injection Vulnerability

The SQL injection vulnerability in Fantastic News allows an attacker to inject malicious SQL statements through the 'category' parameter in the 'news.php' script. This can lead to a compromise of the application, disclosure or modification of data, or exploitation of vulnerabilities in the underlying database implementation.

PHP Upload Center Directory Traversal Vulnerability

PHP Upload Center is prone to a directory traversal vulnerability. This is due to a lack of proper sanitization of user-supplied input. An attacker can exploit this issue to retrieve arbitrary remote files on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

ASP-Rider SQL Injection Vulnerability

ASP-Rider is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. An example Referer header has been supplied: http://[SQLINJECTION]

Cross-Site Scripting Vulnerabilities in SearchSolutions SearchFeed, RevenuePilot, and Google API

The vulnerabilities exist due to a lack of proper sanitization of user-supplied input in SearchSolutions SearchFeed, RevenuePilot, and Google API. An attacker can exploit these vulnerabilities by injecting arbitrary script code into the affected site, leading to the execution of malicious code in the browser of unsuspecting users. This can result in the theft of authentication credentials and other potential attacks.

Local File Include Vulnerability in PHP Doc System

PHP Doc System is prone to a local file-include vulnerability. This is due to the application's failure to properly sanitize user-supplied input. This may facilitate the unauthorized viewing of files and unauthorized execution of local PHP code.

Multiple Local File Include and Information Disclosure Vulnerabilities in GuppY

An attacker can execute arbitrary server-side script code and gain unauthorized access by exploiting these vulnerabilities in GuppY. The attacker can also read arbitrary files on the affected computer using directory traversal sequences and NULL characters.

Recent Exploits: