header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

(PRL-2009-08)

Novell Directory Services is a hierarchical, object oriented database that represents all the assets in an organization in a logical tree. Assets can include people, positions, servers, workstations, applications, printers, services, groups, etc. The use of dynamic rights inheritance and equivalence allows both global and fine grained access controls to be implemented efficiently. Access rights between objects in the tree are determined at the time of the request and is determined by the rights assigned to the objects by virtue of their location in the tree, any security equivalences and individual assignment. Proof of concept DoS code was provided which exploited the vulnerability.

Protek Research Lab’s

This exploit is a Cross-site Scripting (XSS) vulnerability in the dhost/modules of example.com. The vulnerability allows an attacker to inject malicious JavaScript code into the web page, which is then executed in the browser of the victim. The malicious code can be used to steal sensitive information, such as session cookies, or to redirect the user to a malicious website.

SSL3_Read_Bytes() Buffer Overflow

The ssl3_read_bytes() function in s3_pkt.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TLS handshake, related to a 'Triple Handshake' attack.

Mozilla Network Security Services (NSS) Security Bypass Vulnerability

Mozilla Network Security Services (NSS) is prone to a security-bypass vulnerability because it fails to properly validate the domain name in a signed CA certificate, allowing attackers to substitute malicious SSL certificates for trusted ones. The NSS library is used by a number of applications, including Mozilla Firefox, Thunderbird, and SeaMonkey. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks.

EmpireCMS47 SQL Injection Vulnerability

EmpireCMS47 is vulnerable to SQL Injection. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'name', 'email', 'call', 'lytext' and 'enews' parameters of the 'index.php' script. An attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in application's database.

Microsoft Windows EOT Font Table Directory Integer Overflow

This module exploits an integer overflow flaw in the Microsoft Windows Embedded OpenType font parsing code located in win32k.sys. Since the kernel itself parses embedded web fonts, it is possible to trigger a BSoD from a normal web page when viewed with Internet Explorer.

Joomla Component com_cbresumebuilder Remote SQL injection vulnerability – (group_id)

A remote SQL injection vulnerability exists in Joomla Component com_cbresumebuilder. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information from the database.

Recent Exploits: