header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Scripting Vulnerabilities in Chipmunk Products

Multiple cross-site scripting vulnerabilities exist in Chipmunk products due to a failure in properly sanitizing user-supplied input. An attacker can exploit these vulnerabilities by injecting arbitrary script code into the affected site, potentially leading to the theft of authentication credentials and other attacks.

PHPNuke Search Module Directory Traversal Vulnerability

The PHPNuke Search Module is prone to a directory traversal vulnerability. This vulnerability occurs due to a lack of proper sanitization of user-supplied input. A remote attacker can exploit this vulnerability to view files that are only intended to be accessible to authenticated and authorized users. The attacker can use the information obtained in further attacks.

Multiple Remote and Local File Include Vulnerabilities in MySource

The vulnerabilities are caused by a failure in the application to properly sanitize user-supplied input. An attacker can exploit these vulnerabilities to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process, potentially leading to unauthorized access.

Multiple Cross-Site Scripting Vulnerabilities in MySource

The vulnerabilities exist due to a lack of proper input sanitization in MySource. An attacker can exploit these vulnerabilities by injecting arbitrary script code into the affected site. This can lead to the execution of malicious code in the browser of unsuspecting users, potentially allowing the theft of authentication credentials and other attacks.

Cross-Site Scripting Vulnerability in NetFlow Analyzer 4

NetFlow Analyzer 4 is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Local Command-Injection Vulnerability in Linux Kernel via Console Keymap Modifications

The Linux kernel is susceptible to a local command-injection vulnerability via console keymap modifications. This issue occurs because unprivileged users can alter the system-wide console keymap.Local users may modify the console keymap to include scripted macro commands. This allows attackers to execute arbitrary commands with the privileges of the user that uses the console after them, potentially facilitating privilege escalation.

Multiple Cross-Site Scripting Vulnerabilities in BackOffice Plus

BackOffice Plus is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Recent Exploits: