header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHPLive! SQL Injection Vulnerability

PHPLive! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Easy Image Downloader Cross-Site Scripting Vulnerability

Easy Image Downloader is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Oracle Database Remote Vulnerability

Oracle Database is prone to a remote vulnerability affecting the 'Listener' component. The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker doesn't require privileges to exploit this vulnerability. The attacker can exploit this issue to crash the affected application, denying service to legitimate users.

Oracle Database Cross-Site Scripting Vulnerability

Oracle Database is prone to a cross-site scripting vulnerability that affects the Secure Enterprise Search component. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Oracle Database Remote Heap Memory-Corruption Vulnerability

Oracle Database is prone to a remote heap memory-corruption vulnerability in Network Foundation. The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker doesn't require privileges to exploit this vulnerability. Successfully exploiting this issue will allow the attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Oracle WebLogic Server Cross-Site Scripting Vulnerability

An attacker with 'WLS Console Package' privileges can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

HP ProCurve Threat Management Services zl Module Security Bypass Vulnerability

HP ProCurve Threat Management Services zl Module is prone to a security-bypass vulnerability. Successful exploits may allow attackers to bypass certain security restrictions, which may aid in launching further attacks. ProCurve Threat Management Services zl Module J9155A running vST.1.0.090213 firmware or prior is vulnerable. Exploitation involves going to the VPN-->Certificates--> CRL page and loading a CRL list, saving the entire configuration, rebooting the TMS zl Module, and then going to the VPN--> Certificates--> CRL page and the CRL is no longer available.

Recent Exploits: