header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Outlook Express Attachment File Extension Obfuscation Vulnerability

Microsoft Outlook Express is prone to an attachment file extension obfuscation vulnerability that may present a risk under certain configurations. The issue manifests due to Microsoft Outlook Express behavior while handling an 'EML' email attachment. If the email attachment does not have a filename, the subject of the attached email message is used as the filename. Reports indicate that this may be leveraged to make the attached email message executable. It is possible to cause a default file handler to be invoked to process the attached email message. Potentially allowing for code execution.

HP OpenView Radia Notify Daemon (RADEXECD) Remote Buffer Overflow Vulnerabilities

HP OpenView Radia Notify Daemon (RADEXECD) is affected by multiple remote buffer overflow vulnerabilities. An attacker can craft a malicious request that can overflow a buffer and result in process memory corruption. These issues may be exploited to gain unauthorized access in the context of the server. The proof of concept involves sending a malicious request containing a buffer of 0x90 characters, a return address, and shellcode.

NEXTWEB (i)Site SQL Injection Vulnerability

NEXTWEB (i)Site is prone to an SQL injection vulnerability due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by supplying the username "admin" and the password "' or 'a'='a" to gain access to the admin control panel.

JiRo’s Upload System SQL Injection Vulnerability

JiRo's Upload System is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. Supplying the following is sufficient to gain access to the admin control panel: Username =admin Password= ' or ''='

MyBB Multiple Cross-Site Scripting and SQL Injection Vulnerabilities

MyBB is prone to multiple cross-site scripting and SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. The application is prone to multiple SQL injection vulnerabilities. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. The application is also prone to multiple cross-site scripting vulnerabilities. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Calendarix Multiple SQL-Injection and Cross-Site Scripting Vulnerabilities

Calendarix is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. Exploiting the SQL-injection issues could allow attackers to compromise the application, obtain or modify data, or exploit vulnerabilities in the underlying database. Exploiting the cross-site scripting issues may allow the attacker to run arbitrary script code in the browser of an unsuspecting user, which may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

PowerDownload Remote File Include Vulnerability

PowerDownload is prone to a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

X-Cart SQL Injection and Cross-Site Scripting Vulnerabilities

X-Cart is prone to SQL injection and cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. These vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. An attacker may also steal cookie-based authentication credentials and carry out other attacks.

Hosting Controller Unauthorized Access Vulnerability

Hosting Controller is prone to an unauthorized access vulnerability. Reportedly an authenticated user can modify other user's profiles. This issue is due to a failure in the application to perform proper authentication before providing access to 'UserProfile.asp'.

Recent Exploits: