header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

RSS-aggregator Multiple SQL-injection and Authentication-Bypass Vulnerabilities

RSS-aggregator is prone to multiple SQL-injection and authentication-bypass vulnerabilities. A successful exploit could allow an attacker to compromise the application, access or modify data, exploit vulnerabilities in the underlying database, and gain administrative access to the affected application.

S.T.A.L.K.E.R Multiple Remote Vulnerabilities

S.T.A.L.K.E.R is prone to multiple remote vulnerabilities, including a stack-based buffer-overflow vulnerability, an integer-overflow vulnerability, and a denial-of-service vulnerability. An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

AceFTP Directory-Traversal Vulnerability

AceFTP is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input. Exploiting this issue allows an attacker to write arbitrary files to locations outside of the application's current directory. This could help the attacker launch further attacks.

Microsoft Internet Explorer Cross-Domain Scripting Security-Bypass Vulnerability

Microsoft Internet Explorer is prone to a cross-domain scripting security-bypass vulnerability because the application fails to properly enforce the same-origin policy. An attacker can exploit this issue to change the location of a frame from a different domain. This allows the attacker to execute arbitrary code in a frame of the same window as content from a different domain. Successful exploits will allow the attacker to access information from the parent document via DOM components that are not domain-reliant (such as the 'onmousedown' event).

Rat CMS Multiple Input Validation Vulnerabilities

The Rat CMS is prone to multiple input-validation vulnerabilities, including SQL-injection issues and cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

The Rat CMS Multiple Input-Validation Vulnerabilities

The Rat CMS is prone to multiple input-validation vulnerabilities, including SQL-injection issues and cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

GNOME Rhythmbox Remote Denial-of-Service Vulnerability

GNOME Rhythmbox is prone to a remote denial-of-service vulnerability because it fails to handle specially crafted input. Exploiting this issue allows remote attackers to crash the application and trigger denial-of-service conditions, denying further service to legitimate users. Given the nature of this issue, code execution may be possible, but this has not been confirmed.

Recent Exploits: