header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Comodo Firewall Multiple Denial-of-Service Vulnerabilities

Comodo Firewall is prone to multiple denial-of-service vulnerabilities because it fails to adequately validate user supplied data. Exploiting these issues may permit attackers to cause system crashes and deny service to legitimate users. Presumaby, attackers may also be able to execute arbitrary code, but this has not been confirmed.

AVM Fritz!DSL IGD Control Service Remote Information Disclosure Vulnerability

The AVM Fritz!DSL IGD Control Service is prone to a remote information-disclosure vulnerability because the application fails to properly sanitize user-supplied input. Exploiting this issue allows remote, unauthenticated attackers to retrieve the contents of arbitrary files from vulnerable computers with SYSTEM-level privileges. Information harvested may aid in further attacks.

SmE File Mailer SQL Injection Vulnerability

SmE File Mailer is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. The following input to the login form is sufficient to exploit this issue: Login: admin Password: anything' OR 'x'='x

Outpost Firewall PRO Local Privilege Escalation Vulnerability

Outpost Firewall PRO is prone to a local privilege-escalation vulnerability because it fails to perform adequate SSDT (System Service Descriptor Table) hooking on files in its installation directory. A local attacker can exploit this issue to elevate their privileges, which can lead to the complete compromise of an affected computer.

Magic Photo Storage Website Remote File-Include Vulnerabilities

Magic Photo Storage Website is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Star FTP server 1.10 Remote 0day DoS Exploit

Star FTP server 1.10 is vulnerable to a remote DoS attack due to a stack overflow vulnerability. The vulnerability is triggered when a malicious user sends a specially crafted RETR command with an overly long argument to the FTP server. This causes the stack to overflow and the server to crash.

mxBB Module Meeting <= 1.1.2(meeting_constants.php) Remote File Include Vulnerability

The vulnerability exists due to the use of user-supplied input in the 'module_root_path' parameter of 'meeting_constants.php' script without proper sanitization. This can be exploited to include arbitrary files from local and external resources by passing a malicious path in the 'module_root_path' parameter.

Recent Exploits: