header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebTrends Reporting Center Management Interface Path Disclosure Vulnerability

The WebTrends Reporting Center management interface discloses installation path information when an invalid argument for an interface URI parameter is requested. This information may permit an attacker to enumerate the layout of the underlying file system of the host.

PHPix Remote Command Execution Vulnerability

It has been reported that PHPix is vulnerable to a remote command execution vulnerability due to poor handling of externally supplied data such as shell metacharacters. This issue may allow unauthorized access to the affected system with the privileges of the web server hosting the vulnerable program. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.

NETCam Viewer Directory Traversal Vulnerability

It has been reported that the NETCam webserver of NETCam Viewer may be prone to a directory traversal vulnerability that may allow a remote attacker to access information outside the server root directory. AIPTEK NETCam Viewer versions 1.0.0.28 and prior are reported to be prone to this issue, however, other versions could be affected as well.

GetWare Web Server Remote Denial of Service Vulnerability

The GetWare Web Server component has been reported prone to a remote denial of service vulnerability. It has been reported that the issue will present itself when the affected web server receives malicious HTTP requests that contain negative values for the Content-Length field in the HTTP header. A remote attacker may exploit this issue to deny service to the GetWare Web Server.

GoAhead WebServer Directory Management Policy Bypass Vulnerability

GoAhead WebServer is prone to a vulnerability that may permit remote attackers to bypass directory management policy. It is reported that certain syntax may be used in HTTP GET requests to bypass the policy for how certain request should be handled, for example, a script that should be interpreted may be downloaded by the attacker instead. This could allow for unauthorized access to resources hosted on the server, likely resulting in disclosure of sensitive information such as script source code.

YaBB SE SQL Injection

It has been reported that a problem exists in the SSI.php script distributed as part of YaBB SE. Due to insufficient sanitizing of user-supplied URI parameters, it is possible for a remote user to inject arbitrary SQL queries into the database used by YaBB SE. This could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks.

Mambo Open Source Remote File Include Vulnerability

It has been reported that Mambo Open Source may be prone to a remote file include vulnerability that may allow an attacker to include malicious external files containing arbitrary PHP code to be executed on a vulnerable system. The issue exists because remote users may reportedly influence the include path for external scripts by supplying their own value for the 'mosConfig_absolute_path' variable in the 'mod_mainmenu.php' script.

Multiple JDBC Database Implementations Insecure Default Security Policies

Multiple JDBC database implementations include insecure default security policies, which could expose vulnerable databases to denial of service attacks. This could also permit remote attackers to execute arbitrary commands on systems hosting vulnerable implementations in some circumstances.

A number of vulnerabilities have been found in all version of MetaDot Corporation’s MetaDot Portal Server

MetaDot Portal Server fails to properly validate user input, allowing an attacker to inject malicious code into the application. In this example, an attacker can inject an iframe tag with a malicious URL into the application, which can be used to execute malicious code on the user's browser.

Recent Exploits: