header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP-Nuke Change News

It has been reported that an input validation error exists in the index.php file included with PHPNuke as part of the News module. Because of this, an attacker could send a malicious string through PHPNuke that would allow the attacker to manipulate the database and alter information on articles posted on the site.

Information Disclosure Vulnerability in Advanced Poll

Advanced Poll is vulnerable to an information disclosure vulnerability. A remote user can access privileged information by accessing the info.php files located in the poll_dir/db/ and poll_dir/textfile/ directories. This information can be used to further attack the host and its users.

PHPNuke News Module Input Validation Error

It has been reported that an input validation error exists in the article.php file included with PHPNuke as part of the News module. Because of this, an attacker could send a malicious string through PHPNuke that would allow the attacker to manipulate the database, and gain unauthorized access to user accounts. An example of this exploit is provided in the text.

Weakness in ProtWare HTML Guardian Encryption Scheme

A weakness has been reported in the encryption scheme used by ProtWare HTML Guardian. Specifically, the encryption scheme implemented obfuscates data using a simple bit shifting technique, making it trivial for attackers to reverse. Administrators may be relying on a false sense of security by implementing the protection supplied by HTML Guardian.

eDonkey Clients for Windows Denial of Service Vulnerability

A vulnerability has been reported for eDonkey clients for Windows that will result in a denial of service condition. The vulnerability occurs when numerous chat dialog boxes are opened by the eDonkey or Overnet clients. Every open chat dialog box will consume a small amount of memory and CPU cycles. An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests.

Check Point FW-1 Syslog Daemon Escape Sequence Processing Vulnerability

An issue has been discovered in Check Point FW-1 syslog daemon when attempting to process a malicious, remotely supplied, syslog message. Specifically, some messages containing escape sequences are not properly filtered out. This may result in unpredictable behaviour by the Check Point syslog daemon.

Recent Exploits: