header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buzlas v2006-1 Full Remote File Include Vulnerability

Buzlas is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

ExtCalThai Multiple Remote File-Include Vulnerabilities

ExtCalThai is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

4images Cross-Site Scripting Vulnerability

4images is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

PHP TopSites Remote File Include Vulnerability

PHP TopSites is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input data. An attacker can exploit this issue to have malicious PHP code execute in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

phpList Multiple Cross-Site Scripting Vulnerabilities

phpList is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may help the attacker steal cookie-based authentication credentials and launch other attacks.

MS Windows spoolss GetPrinterData() 0day Memory Allocation Remote DoS Exploit

This exploit is used to cause a denial of service (DoS) on a remote Windows host by allocating a large amount of memory using the GetPrinterData() function of the spoolss service. The exploit was discovered by h07 and tested on Windows 2000 SP4 Polish with all Microsoft Security Bulletins.

Netscape Portable Runtime API Privilege Escalation Vulnerability

The Netscape Portable Runtime API running on Sun Solaris 10 operating system is prone to a local privilege-escalation vulnerability. A successful exploit of this issue allows an attacker to gain superuser privileges, completely compromising the affected computer. Version 4.6.1 running on Sun Solaris 10 is vulnerable to this issue.

Recent Exploits: