header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TW-WebServer/1, 3, 2, 0 Denial of Service Vulnerability

It has been reported that TW-WebServer is prone to a denial of service vulnerability. Reportedly when an excessive quantity of data is sent to the TW-Webserver as part of a malicious HTTP GET request the server will fail. Although unconfirmed, due to the nature of this vulnerability, an attacker may have the ability to supply and execute arbitrary code.

TW-WebServer Denial of Service Vulnerability

It has been reported that TW-WebServer is prone to a denial of service vulnerability. Reportedly when an excessive quantity of data is sent to the TW-Webserver as part of a malicious HTTP GET request the server will fail. Although unconfirmed, due to the nature of this vulnerability, an attacker may have the ability to supply and execute arbitrary code.

Insufficient Sanitization Vulnerability in Xonic.ru News

Xonic.ru News is vulnerable to an attack due to insufficient sanitization of user-supplied data to the 'script.php' file. An attacker can pass malicious PHP or shell commands in requests to a target server, which will be executed with the privileges of the vulnerable application.

Ikonboard 3.1.1 Remote Command Execution PoC

It has been reported that IkonBoard is prone to an arbitrary command execution vulnerability. The vulnerability is due to insufficient sanitization performed on user supplied cookie data. An attacker may exploit this issue to execute arbitrary commands in the security context of the web server hosting the vulnerable IkonBoard.

IkonBoard Arbitrary Command Execution Vulnerability

It has been reported that IkonBoard is prone to an arbitrary command execution vulnerability. The vulnerability is due to insufficient sanitization performed on user supplied cookie data. An attacker may exploit this issue to execute arbitrary commands in the security context of the web server hosting the vulnerable IkonBoard.

osCommerce Authentication Bypass Vulnerability

It has been reported that osCommerce uses HTTP header information as a part of its authentication mechanism. Reportedly an attacker may spoof parts of the HTTP header and, in doing so, subvert osCommerce authentication systems set in place. This attack may be used in conjunction with other attacks to disclose, what may be sensitive information, to the attacker.

osCommerce Denial of Service Vulnerability

It has been reported that an attacker may trigger a denial of service condition in osCommerce application. If malicious URI parameters are passed to several of the osCommerce PHP pages, the mySQL and web server hosting osCommerce reportedly becomes unstable, possibly resulting in a denial of service condition.

Recent Exploits: