header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Arbitrary File Download Vulnerability in Sisfo Kampus

The application Sisfo Kampus is vulnerable to an arbitrary-file-download vulnerability. This vulnerability occurs due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability to download arbitrary files within the context of the webserver process, potentially leading to further attacks.

phpMyQuote Multiple Input-Validation Vulnerabilities

phpMyQuote is prone to multiple input-validation vulnerabilities, including a cross-site scripting issue and an SQL-injection issue, because the application fails to sanitize user-supplied input. A successful exploit may allow an attacker to steal cookie-based authentication credentials, execute malicious script code in a user's browser, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

SQL Injection in Proxy Anket

Proxy Anket is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Stack-based Buffer Overflow in Microsoft Agent

The Microsoft Agent (agentsvr.exe) application is vulnerable to a stack-based buffer overflow. This vulnerability occurs due to the application's failure to properly validate user-supplied data, allowing remote attackers to execute arbitrary code in the context of the logged-in user. Failed exploit attempts may result in denial-of-service conditions.

AkkyWareHOUSE 7-zip32.dll Heap-Based Buffer Overflow Vulnerability

The vulnerability is caused by a heap-based buffer overflow in AkkyWareHOUSE 7-zip32.dll due to improper bounds checking of user-supplied input. Attackers can exploit this vulnerability to execute arbitrary machine code in the context of the affected application, leading to potential denial-of-service conditions.

SQL Injection Vulnerability in E-Smart Cart

The E-Smart Cart application is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. A proof of concept is available where the attacker can use the username 'or''=' and password 'or''=' to exploit the vulnerability.

Cross-Site Scripting Vulnerability in Apache Tomcat

Apache Tomcat is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

212cafe Webboard SQL Injection Vulnerability

The 212cafe Webboard is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: