header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SQL Injection Vulnerability in Car Portal

Car Portal is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

HTML-injection vulnerability in Horde IMP Webmail

Horde IMP Webmail is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data before it is used in dynamic content. Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.

TOPHangman SQL and HTML Injection Vulnerabilities

The TOPHangman application fails to properly sanitize user-supplied input, leading to SQL and HTML injection vulnerabilities. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, exploit other latent vulnerabilities in the database, or execute arbitrary script code in the context of an unsuspecting user's browser. This can result in stealing authentication credentials, controlling the site's appearance, and launching further attacks.

WSN Guest 1.21 Version Comments.PHP “ID” SQL Injection Exploit

The WSN Guest 1.21 version of the Comments.PHP script is vulnerable to SQL Injection. This can be exploited by an attacker to inject malicious SQL code into the 'id' parameter of the script. The exploit allows the attacker to retrieve sensitive information from the database, such as usernames and passwords of the WSN Guestbook members.

MySITE SQL Injection and Cross-Site Scripting Vulnerabilities

MySITE is vulnerable to an SQL-injection vulnerability and a cross-site scripting vulnerability due to inadequate input sanitization. Exploiting these vulnerabilities could allow an attacker to steal authentication credentials, compromise the application, access or modify data, or exploit other vulnerabilities in the database.

Server Log File Disclosure

This exploit allows an attacker to access sensitive server log files by exploiting a directory traversal vulnerability. By manipulating the 'folder' parameter, the attacker can traverse the file system and access log files located outside the intended directory. The attacker sends a specially crafted HTTP request to the target server, causing it to disclose the contents of the log files in the server's response.

Advantech WebAccess dvs.ocx GetColor Buffer Overflow

This module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9.

Recent Exploits: