header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

e107 CMS Multiple Cross-Site Scripting Vulnerabilities

e107 CMS is prone to multiple cross-site scripting vulnerabilities because the application fails to sanitize user-supplied input. An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

ForumJBC Cross-Site Scripting Vulnerability

ForumJBC is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverge this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Verso NetPerformer Frame Relay Access Device (FRAD) Remote Buffer Overflow Vulnerability

A remote attacker can exploit this issue to execute arbitrary code on the affected device. Failed exploit attempts will likely crash the device, denying service to legitimate users. The exploit code is written in Perl and it sends a LOGIN command with an overly long string of 'A' characters followed by 'BCDE' to the telnet service on port 23.

Telekorn Signkorn Guestbook Multiple Remote File-Include Vulnerabilities

Telekorn Signkorn Guestbook is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

AT-TFTP Server v1.9 Buffer Overflow Vulnerability

A vulnerability has been identified in TFTP Server AT-TFTP Server v1.9, which could be exploited by remote or local attackers to execute arbitrary commands or cause a denial of service. This flaw is due to a buffer overflow error when handling an overly long file name (more than 227 bytes) passed to a 'GET' or 'PUT' command, which could be exploited by malicious users to compromise a vulnerable system or crash an affected application.

Apple QuickTime Multiple Vulnerabilities

Apple QuickTime is prone to multiple vulnerabilities because it fails to properly bounds-check and sanitize user-supplied data. An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers.

Recent Exploits: