header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ibrahim Γƒ?AKICI Okul Portal SQL Injection Vulnerability

The Ibrahim Γƒ?AKICI Okul Portal is vulnerable to an SQL injection vulnerability due to insufficient sanitization of user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability by manipulating the SQL query logic to perform unauthorized actions on the underlying database.

Cross-Site Scripting Vulnerability in OfficeConnect Secure Router

The OfficeConnect Secure Router is vulnerable to cross-site scripting attacks. An attacker can exploit this vulnerability to launch attacks on unsuspecting users by injecting malicious code into the affected website. This can lead to the theft of cookie-based authentication credentials and other attacks.

Cross-Site Scripting Vulnerabilities in WmsCMS

WmsCMS is prone to multiple cross-site scripting vulnerabilities because it fails to adequately sanitize user-supplied input data before rendering it in a user's browser. Attackers could exploit these issues to steal cookie-based authentication credentials from legitimate users of the site; other attacks are also possible.

Atom PhotoBlog Multiple Input-Validation Vulnerabilities

Atom PhotoBlog is prone to multiple input-validation vulnerabilities because it fails to adequately sanitize user-supplied input data before rendering it in a user's browser. These issues include multiple HTML-injection vulnerabilities and a cross-site scripting vulnerability. Attackers could exploit these issues to steal cookie-based authentication credentials from legitimate users of the site; other attacks are also possible.

Remote Denial-of-Service Vulnerability in Microsoft Windows

The vulnerability exists in Microsoft Windows due to its failure to handle maliciously crafted ICO files. An attacker can exploit this vulnerability by tricking users into opening a malicious file. Successful exploitation of this vulnerability will lead to denial-of-service conditions on applications that use the affected library. Vulnerable applications include Windows Explorer and Picture and Fax viewer.

Arbitrary File Download Vulnerability in ASP Folder Gallery

ASP Folder Gallery is prone to an arbitrary-file-download vulnerability because the application fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files within the context of the affected webserver.

JD-Wiki Remote File Include Vulnerabilities

JD-Wiki is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Remote File Inclusion in JD-Wiki

JD-Wiki is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. An attacker can exploit these issues to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Recent Exploits: