header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Stack-Based Buffer Overflow Vulnerability in IBM Lotus Domino

The vulnerability exists due to a failure in performing adequate boundary checks on user-supplied input. A remote attacker can exploit this vulnerability by sending a specially crafted request to the affected server, which could lead to the execution of arbitrary code with system-level privileges. Successful exploitation of this vulnerability would completely compromise the affected computers. Failed exploit attempts may result in a denial-of-service condition.

Card sharj SQL Injection Vulnerabilities

Card sharj is prone to multiple SQL-injection vulnerabilities because the application fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

net4visions Multiple Cross-Site Scripting Vulnerabilities

net4visions is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting Vulnerability in Aspgwy Access

Aspgwy Access is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Toko LiteCMS HTTP Response Splitting and Cross-Site Scripting Vulnerabilities

Toko LiteCMS is prone to an HTTP-response-splitting vulnerability and multiple cross-site scripting vulnerabilities. An attacker can execute arbitrary script code in the browser, steal authentication credentials, and manipulate web content. The vulnerability exists in Toko LiteCMS version 1.5.2.

Multiple SQL-injection vulnerabilities in Ay Computer products

Multiple Ay Computer products are prone to multiple SQL-injection vulnerabilities because they fail to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

ASP Basit Haber Script SQL Injection Vulnerability

The ASP Basit Haber Script is vulnerable to an SQL injection attack due to improper sanitization of user-supplied input used in an SQL query. An attacker can exploit this vulnerability to compromise the application, gain unauthorized access or modify data, and exploit vulnerabilities in the underlying database.

Recent Exploits: