header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection Vulnerability in ShockBoard

The ShockBoard application is prone to an SQL injection vulnerability. This vulnerability occurs due to a failure in the application's input sanitization process, allowing an attacker to inject malicious SQL code into the 'offset' parameter of the '/topic.php' page. Successful exploitation of this vulnerability can lead to various security consequences, including compromising the application, unauthorized disclosure or modification of data, and exploitation of vulnerabilities in the underlying database implementation.

SQL Injection Vulnerabilities in edmoBBS

edmoBBS is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Kasseler CMS Multiple Vulnerabilities

Multiple vulnerabilities in Kasseler CMS allow for SQL injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF) attacks. The SQL injection vulnerability (CVE-2013-3727) allows remote authenticated administrators to execute arbitrary SQL commands. The XSS vulnerability can be exploited by tricking a logged-in administrator to visit a webpage with a CSRF exploit. The CSRF vulnerability can be used to perform DNS exfiltration on a Windows platform.

SQL Injection Vulnerabilities in K-Search

K-Search is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

AllWeb Search SQL Injection Vulnerability

AllWeb Search is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

BerliOS SourceWell SQL Injection Vulnerability

The BerliOS SourceWell application is prone to an SQL injection vulnerability. This vulnerability occurs when user-supplied input is not properly sanitized before being used in an SQL query. An attacker can exploit this vulnerability to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

Softbiz Resource Repository Script SQL Injection Vulnerabilities

Softbiz Resource Repository Script is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Nelogic Nephp Publisher SQL Injection Vulnerabilities

The Nelogic Nephp Publisher application is prone to SQL injection vulnerabilities. These vulnerabilities occur due to a lack of proper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit these vulnerabilities to compromise the application, disclose or modify data, or exploit vulnerabilities in the underlying database implementation.

SQL injection vulnerabilities in Bedeng PSP

Bedeng PSP is prone to SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Recent Exploits: