header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer Overflow in Electrasoft 32Bit FTP Client

It has been reported that Electrasoft 32Bit FTP client may be prone to a buffer overflow condition. This issue is due to the client not implementing bounds checking on banner data copied into local memory buffers. It may be possible for remote attackers to corrupt sensitive regions of memory with attacker-supplied values, possibly resulting in execution of arbitrary code.

Buffer Overflow in ByteCatcher FTP Client

It has been reported that ByteCatcher FTP client may be prone to a buffer overflow condition. This issue is due to the client not implementing bounds checking on banner data copied into local memory buffers. It may be possible for remote attackers to corrupt sensitive regions of memory with attacker-supplied values, possibly resulting in execution of arbitrary code.

Opera Console Error Message Disclosure Vulnerability

It has been reported that Opera fails to ensure that a remote site has proper authorization before executing some methods used to access error messages stored in the Opera console. This issue is further exacerbated by the fact that error messages also contain the URL of the site that caused the issue. This can be exploited by a malicious attacker to obtain a listing of the victim user's Web browsing habits for, potentially, malicious purposes.

Opera HTML Injection Vulnerability

It has been reported that, when generating HTML to display images or embedded media, Opera does not correctly format the provided URL or sufficiently encode URLs to local files. As a result of this lack of sanitization Opera is vulnerable to HTML injection attacks when handling local image or media files.

QNX Real-Time Operating System Arbitrary File Access Vulnerability

It has been reported that an unauthorized user may access arbitrary files on QNX Real-Time Operating System by requesting the file through the location that the FAT partition is mounted to. Accessing files in this manner ignores all permissions set by the operating system.

PHP-Nuke Remote Code Execution Vulnerability

A problem with PHP-Nuke could allow remote users to execute arbitrary code in the context of the web site. The problem is in the lack of sanitization of some types of input. PHP-Nuke does not sanitize code submitted to a site from the avatar select box. Due to this, a malicious user may be able to submit embedded code from their profile page instead of an avatar. This would result in code being executed in the location where a user's avatar should normally display. This code would be executed by a victim user's browser in the context of the site.

chpass Local File Access

A vulnerability in chpass, a program included with OpenBSD, allows local users to gain access to the content of specific files. This vulnerability requires that lines in the target file be constructed in a specific format. This problem also affects the chfn and chsh programs which are hard links to the chpass binary. An attacker can create a symbolic link to a file containing sensitive information, and then use chpass to view the contents of the file.

SQL Injection in phpMyShop

phpMyShop, in some cases, does not sufficiently sanitize user-supplied input which is used when constructing SQL queries. As a result, attackers may supply malicious parameters to manipulate the structure and logic of SQL queries. This vulnerability was reported to exist in the compte.php script file. A remote attacker can exploit this vulnerability to bypass the phpMyShop authentication/registration process by sending a specially crafted HTTP request containing malicious parameters.

myphpPageTool Remote File Inclusion Vulnerability

myphpPageTool is prone to a remote file inclusion vulnerability due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by manipulating some URI parameters to include a malicious file from a remote server.

Recent Exploits: