header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dalbum CSRF and XSS Vulnerabilities

The CSRF vulnerability exists in the 'pass.php' script of the Dalbum product, which fails to properly verify the source of HTTP requests. An attacker can exploit this vulnerability by using a browser and submitting a crafted form. The XSS vulnerability exists in the 'editini.php' script, which fails to properly sanitize user-supplied input in the 'url' variable, allowing the execution of arbitrary JavaScript code.

IBM Tivoli Directory Server SASL Bind Request Remote Code Execution Vulnerability

The IBM Tivoli Directory Server (ITDS) is vulnerable to remote code execution through the SASL bind request. This vulnerability allows an attacker to execute arbitrary code on the target system, potentially compromising the entire server. It affects the Windows platform.

Wireshark <= 1.4.4 packet-dect.c Stack Buffer Overflow

This module exploits a stack buffer overflow in Wireshark <= 1.4.4 When opening a malicious .pcap file in Wireshark, a stack buffer occurs, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR and works on XP, Vista & Windows 7.

Microsoft Host Integration Server Denial of Service Vulnerabilities

This vulnerability allows for an endless loop affecting all the services that use the TCP protocol, as well as the snabase.exe service on port 1478, snalink.exe on their dynamic ports, snaservr.exe, and mngagent.exe. The cause of this vulnerability is the 'word[packet] - 2' code, which forces continuous parsing of the same data. There are also other Denial of Service vulnerabilities that affect the UDP protocol used in snabase.exe on port 1478. When this service terminates, other services depending on it, such as snalink and msngagent, will also terminate.

Zend Server Java Bridge Arbitrary Java Code Execution

This module takes advantage of a trust relationship issue within the Zend Server Java Bridge. The Java Bridge is responsible for handling interactions between PHP and Java code within Zend Server. When Java code is encountered Zend Server communicates with the Java Bridge. The Java Bridge then handles the java code and creates the objects within the Java Virtual Machine. This interaction however, does not require any sort of authentication. This leaves the JVM wide open to remote attackers. Sending specially crafted data to the Java Bridge results in the execution of arbitrary java code.

joomlacontenteditor (com_jce) BLIND sql injection vulnerability

JCE makes creating and editing Joomla!® content easy Add a set of tools to your Joomla!® environment that give you the power to create the kind of content you want, without limitations, and without needing to know or learn HTML, XHTML, CSS...

Recent Exploits: