header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ICMusic SQL Injection Vulnerability

ICMusic is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Cross-Site Scripting Vulnerability in Prontus CMS

Prontus CMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

SQL Injection vulnerability in com_voj component for Joomla!

The 'com_voj' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Pro Softnet IDrive Online Backup ActiveX Control Arbitrary File Overwrite

The Pro Softnet IDrive Online Backup ActiveX control is prone to a vulnerability that allows attackers to overwrite files with arbitrary, attacker-controlled content. An attacker can exploit this issue to corrupt and overwrite arbitrary files on a victim's computer in the context of the vulnerable application using the ActiveX control (typically Internet Explorer). The provided HTML code demonstrates an example of the exploit.

Cross-Site Scripting Vulnerability in Classified Script

The Classified Script is vulnerable to a cross-site scripting (XSS) attack due to inadequate sanitization of user-supplied data. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other malicious activities.

ClearSCADA Remote Authentication Bypass Exploit

There is an authentication bypass vulnerability in ClearSCADA that can be exploited by triggering an exception in dbserver.exe and taking advantage of the way the program handles it. When an exception occurs, ClearSCADA enters "Safe Mode" which exposes its diagnostic functions to remote users without requiring a valid login. A remote attacker could view sensitive information and possibly modify functions of the server running on the affected host.

Paliz Portal Multiple Vulnerabilities

The Paliz Portal application is prone to multiple SQL-injection vulnerabilities and a cross-site scripting vulnerability. These vulnerabilities occur due to a failure in properly sanitizing user-supplied input. An attacker can exploit these issues to steal cookie-based authentication credentials, control the rendering of the site, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: