header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Platnik Multiple SQL Injection Vulnerabilities

Platnik is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Netrek format string vulnerability

The Vanilla server in Netrek version <= 2.12.0 is affected by a format string vulnerability. The vulnerability is caused by the calling of the pmessage2() function without the needed format argument. It can be exploited by locking a player who is using a malformed nickname. The EVENTLOG switch must be enabled for exploiting this vulnerability. The exploit code can be found at http://aluigi.org/poc/netrekfs.zip

PHP Multiple Format-String Vulnerabilities

PHP is prone to multiple format-string vulnerabilities because it fails to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. Attackers can exploit these issues to run arbitrary code within the context of the PHP process. This may allow them to bypass intended security restrictions or gain elevated privileges.

Cross-site scripting vulnerability in PHP Banner Exchange

The PHP Banner Exchange application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a targeted user, potentially stealing authentication credentials and launching further attacks.

Arbitrary File Upload in PHP File Uploader

The PHP File Uploader application fails to adequately limit the types of files that are uploaded. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process, leading to unauthorized access, privilege escalation, or other attacks.

Cross-Site Scripting Vulnerability in NPDS Revolution

The NPDS Revolution application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a victim user, potentially allowing them to steal authentication credentials and launch other attacks.

NPDS Revolution SQL Injection Vulnerability

The NPDS Revolution web application is prone to an SQL-injection vulnerability due to insufficient sanitization of user-supplied data before using it in an SQL query. This vulnerability can be exploited by an attacker to compromise the application, gain unauthorized access or modify data, and potentially exploit other latent vulnerabilities in the underlying database.

Cross-Site Scripting Vulnerability in C99Shell

C99Shell is prone to a cross-site scripting vulnerability because the application fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: