header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VGW4/8 Telephony Gateway Remote Authentication Bypass Vulnerability

It has been reported that the VGW4/8 Telephony Gateway is prone to a remote authentication bypass vulnerability via its web configuration tool. The problem is due to a design error in the application that allows a user to access configuration pages without prior authentication. Successful exploitation of this issue may allow a remote attacker to gain control of the affected appliance via its web configuration tool.

YaBB and YaBB SE Multiple Cross-Site Scripting Vulnerabilities

It has been reported that YaBB and YaBB SE are prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure of the applications to properly validate URI supplied user input. Attackers may exploit this vulnerability to steal authentication credentials. Other attacks may also be possible.

Multiple vulnerabilities in EMU Webmail 5.2.7

Multiple vulnerabilities have been identified in the application that may allow an attacker to carry out cross-site scripting attacks and disclose the path to the victim's home directory. The issues are reported to exist in the login script, 'emumail.fcgi' script and the 'init.emu' sample script.

cPanel Remote Command Execution Vulnerability

A potential remote command execution vulnerability has been discovered in the cPanel application. This issue occurs due to insufficient sanitization of externally supplied data to the login script. An attacker may exploit this problem by crafting a malicious URI request for the affected script; the attacker may then supply shell metacharacters and arbitrary commands as a value for the affected variable.

Battle Mages Game Server Remote Denial of Service Vulnerability

The Battle Mages game server has been reported to be prone to a remote denial of service vulnerability. The issue is reported to present itself when the server receives incomplete client data. Specifically the affected server will attempt to read the expected data size infinitely until it is received, this may allow a remote attacker to tie up server resources and effectively deny service to legitimate users.

Multiple vulnerabilities in Pegasi Web Server

Multiple vulnerabilities have been identified in the application that may allow a remote attacker to carry out directory traversal and cross-site scripting attacks. A successful cross-site scripting attack may make it possible for an attacker to create a malicious link to a vulnerable site that includes hostile HTML and script code. This code may be rendered in the browser of a victim user who visits the malicious link and this will occur in the security context of the site hosting the software. The directory traversal vulnerability may allow a malicious user to request files outside of the web-server root directory with directory traversal strings such as '../'.

GNU MyProxy Cross-Site Scripting Vulnerability

It has been reported that GNU MyProxy may be prone to a cross-site scripting vulnerability that may allow a remote attacker to execute HTML or script code in a user's browser. The issue presents itself due to insufficient sanitization of user-supplied data. Due to the possibility of attacker-specified HTML and script code being rendered in a victim's browser, it is possible to steal cookie-based authentication credentials from that user. Other attacks are possible as well.

Multiple Vendor Internet Browsers Cookie Path Argument Restriction Bypass Vulnerability

Multiple vendor Internet Browsers have been reported to be prone to a cookie path argument restriction bypass vulnerability. The issue presents itself due to a failure to properly sanitize encoded URI content, this may make it possible for an attacker to craft a URI that will contain encoded directory traversal sequences sufficient to provide access to a supposedly path exclusive cookie from an alternate path.

UNAK-CMS <= v1.5 (dirroot) Remote File Inclusion Exploit

UNAK-CMS version 1.5 is vulnerable to a remote file inclusion vulnerability. The vulnerability exists in the fckeditor/editor/dialog/fck_link.php script, which fails to properly sanitize user-supplied input to the 'dirroot' parameter. This can be exploited to include arbitrary remote files by passing a URL in the 'dirroot' parameter. Successful exploitation requires that 'register_globals' is set to 'on'.

Recent Exploits: