header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple vulnerabilities in Novell Netware Enterprise Web Server

Novell Netware Enterprise Web Server is vulnerable to cross-site scripting attacks, information disclosure, and file uploads. An attacker can exploit this vulnerability by sending a specially crafted URL to the vulnerable server, which will allow the attacker to execute arbitrary JavaScript code, disclose sensitive information, and upload malicious files.

Finjan SurfinGate Remote Management Command Execution Vulnerability

Finjan SurfinGate is prone to a vulnerability that may permit remote attackers to execute certain management commands (using the FHTTP protocol) through the management control port (3141/TCP). It has been reported that commands could be issued to restart the server, most likely resulting in a denial of service.

Netbus Directory Listings Disclosure and File Upload Vulnerability

It has been reported that Netbus may be prone to a a directory listings disclosure and file upload vulnerability that may allow and attacker to disclose sensitive information and the possibility of corrupting files on the system or placing files such as malicious files in directories where they may be interpreted.

thttpd Cross-Site Scripting Vulnerability

thttpd is prone to a cross-site scripting vulnerability in the CGI test script. This could permit a remote attacker to create a malicious link to the web server that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the web server and may allow for theft of cookie-based authentication credentials or other attacks.

Apache mod_perl Local File Descriptor Leakage

A vulnerability has been reported to exist in the Apache mod_perl module that may allow local attackers to gain access to privileged file descriptors. This issue could be exploited by an attacker to hijack a vulnerable server daemon. Other attacks are also possible. It has been reported that multiple file descriptors, are leaked to the mod_perl module and any processes it creates. This allows for Perl scripts and any processes they spawn to access the privileged I/O streams.

phpunity.postcard (phpunity-postcard.php) Remote File Inclusion Exploit

phpunity.postcard is vulnerable to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by sending a malicious URL to the vulnerable application. This can result in remote code execution.

Mephistoles ‘httpd’ daemon Cross-Site Scripting Vulnerability

Mephistoles 'httpd' daemon fails to sanitize user-supplied input, making it vulnerable to cross-site scripting attacks. This vulnerability allows an attacker to construct a malicious link containing HTML or script code that may be rendered in a user's browser upon visiting that link. This attack would occur in the security context of the affected server.

WebcamXP Cross-Site Scripting Vulnerability

It has been reported that WebcamXP may be prone to a cross-site scripting vulnerability that may allow a remote attacker to execute HTML or script code in a user's browser. It has been reported that HTML and script code may be parsed via a malicious URI. Successful exploitation of this attack may allow an attacker to steal cookie-based authentication credentials. Other attacks are also possible.

2Wire HomePortal Series Directory Traversal Vulnerability

It has been reported that the software is allegedly prone to a directory traversal vulnerability that may allow a remote attacker to access information outside the server root directory. This issue is reported to exist in the 'wralogin' authentication form that is accessed through the HTTPS (SSL) interface. Successful exploitation of this vulnerability may allow a remote attacker to gain access to sensitive information that may be used to launch further attacks against a vulnerable system.

DUware Products Arbitrary File Upload Vulnerability

It has been reported that various DUware products may be prone to an access validation issue allowing a remote attacker to gain access to sensitive resources by bypassing authentication. An arbitrary file upload vulnerability has been specified in DUpics that may allow a remote attacker to upload files to a vulnerable system. Successful exploitation of these issue may allow an attacker to gain unauthorized access to sensitive resources and upload arbitrary files to the host. An attacker can exploit this vulnerability to upload malicious applications to the vulnerable system. The following products are affected: DUclassified, DUdirectory, DUdownload, DUgallery, DUpics, DUportal. The following URLs are vulnerable to the arbitrary file upload vulnerability: http://www.example.com/admin/inc_add.asp, http://www.example.com/admin/inc_edit.asp?iPic=500, http://www.example.com/admin/inc_pics.asp, http://www.example.com/admin/inc_type.asp. Exploitation of this issue may result in the compromise of the affected system.

Recent Exploits: