header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Heap Corruption Vulnerability in eZphotoshare PoC

eZphotoshare has been reported prone to multiple remote memory corruption vulnerabilities. The issues present themselves in the routines employed by eZphotoshare to handle network based communications. It has been reported that a remote attacker may overrun the bounds of a reserved buffer in eZphotoshare process memory by transmitting a number of malicious packets to the host that is running eZphotoshare. This activity will ultimately result in the corruption of variables that are saved adjacent to the affected buffer. These variables are crucial to the operation of the vulnerable software.

Websense Enterprise Cross-site Scripting Vulnerability

Websense Enterprise is vulnerable to Cross-site Scripting attacks when it displays error pages for blocked sites without sufficiently sanitizing HTML and script code from the blocked site URI. This could allow an attacker to inject malicious code into the error page, which could be executed when a victim user visits the link. This could lead to the theft of cookie-based authentication credentials or other malicious activities.

IBM Directory Server Cross-Site Scripting Vulnerability

IBM Directory Server is prone to cross-site scripting attacks via the web administrative interface. An attacker may be able to embed hostile HTML and script code in a malicious link to the server, which when followed will be rendered in the victim user's browser. This could allow the attacker to steal cookie-based authentication credentials or to launch other attacks.

Jason Maloney’s CGI Guestbook Exploit

A vulnerability has been reported in Jason Maloney's Guestbook that could result in remote command execution with the privileges of the web server. The problem occurs due to the application failing to sanitize sensitive script variables after handling POST requests. This could potentially result in the execution of arbitrary system executables.

Information Disclosure Weakness in CuteNews 1.3

An information disclosure weakness has been reported in CuteNews 1.3, that may expose sensitive server configuration data. The problem occurs due to CuteNews accepting a debug query that will result in the exposure of information returned from a call to the phpinfo() function. A malicious person could potentially use information harvested through the exploitation this type of issue to launch future attacks against a target system.

Bypass Authentication to Add IDS Alerts and New User Accounts

A vulnerability has been identified in the system that may allow an attacker to bypass authentication to add attacker supplied IDS alerts and new user accounts in the console. Successful exploitation of these issues may allow an attacker to gain unauthorized access to a vulnerable system or conceal intrusion attempts. Proof of concept exploits have been made available for this issue.

Cross-Site Scripting Vulnerabilities in Macromedia Jrun

A number of cross-site scripting vulnerabilities have been reported for Macromedia Jrun, specifically in the administrative interface. The problem is said to occur due to insufficient sanitization of URI parameters that may be passed to the page by an unauthenticated user. Successful exploitation of this issue could potentially allow an attacker to steal an administrators authentication credentials, likely leading to further malicious actions taking places.

Microsoft Outlook Express MHTML File and res URI Vulnerability

A vulnerability has been discovered in Microsoft Outlook Express when handling MHTML file and res URIs that could lead to an unexpected file being downloaded and executed. The problem occurs due to the component failing to securely handle MHTML file URIs that reference a non-existent resource. The affected Outlook Express component is used by Microsoft Internet Explorer. As a result, a victim browser user may inadvertently access a page designed to load an embedded object from a malicious location. This would effectively result in the execution of attacker-supplied code within the Local Zone.

Recent Exploits: