header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PhpGedView Cross-Site Scripting Vulnerability

PhpGedView is prone to a cross-site scripting vulnerability. Remote attackers may create malicious links to this script that include hostile HTML and script code. If such a link was followed by a victim user, the attacker-supplied code would be rendered in the security context of the site hosting the software. This could be exploited to steal cookie-based authentication credentials. Other attacks are also possible.

PhpGedView Multiple File Include Vulnerabilities

PhpGedView is prone to multiple file include vulnerabilities. The source of the issue is that a number of scripts that ship with the software permit remote users to influence require() paths for various external files. This will permit remote attackers to cause malicious PHP scripts from attacker-controlled servers to be included and subsequently executed in the context of the web server hosting the vulnerable software.

FreznoShop Cross-Site Scripting Vulnerability

FreznoShop is prone to a cross-site scripting vulnerability. Remote attackers may create malicious links to the software that include hostile HTML and script code. If such a link was followed by a victim user, the attacker-supplied code would be rendered in the security context of the site hosting the software. This could be exploited to steal cookie-based authentication credentials. Other attacks are also possible.

Unauthorized Access in ASPapp PortalApp

ASPapp PortalApp is vulnerable to an unauthorized access vulnerability due to the way user credentials are stored on the system. An attacker can exploit this vulnerability by accessing the data/8275.mdb file, which contains the user credentials, and gaining access to sensitive information.

A problem has been reported in the handling of user-supplied input by the Athena Web Registration scripts

The Athena Web Registration scripts are vulnerable to command injection attacks due to insufficient input validation. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server, which will then execute the injected command.

Recent Exploits: