header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Scripting Vulnerability in NetFlow Analyzer 4

NetFlow Analyzer 4 is prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Local Command-Injection Vulnerability in Linux Kernel via Console Keymap Modifications

The Linux kernel is susceptible to a local command-injection vulnerability via console keymap modifications. This issue occurs because unprivileged users can alter the system-wide console keymap.Local users may modify the console keymap to include scripted macro commands. This allows attackers to execute arbitrary commands with the privileges of the user that uses the console after them, potentially facilitating privilege escalation.

Multiple Cross-Site Scripting Vulnerabilities in BackOffice Plus

BackOffice Plus is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Cross-Site Scripting Vulnerability in Complete PHP Counter

The Complete PHP Counter application is vulnerable to a cross-site scripting (XSS) attack. This vulnerability occurs due to the lack of proper input sanitization by the application. An attacker can exploit this vulnerability by injecting arbitrary script code into the 'c' parameter of the 'list.php' page. When an unsuspecting user visits the affected page, the injected script code will be executed in their browser, potentially allowing the attacker to steal their cookie-based authentication credentials or perform other malicious actions.

Complete PHP Counter SQL Injection Vulnerability

The Complete PHP Counter application is prone to an SQL injection vulnerability. The issue arises due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation of this vulnerability could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Directory Traversal Vulnerability in Gallery

The Gallery application is prone to a directory traversal vulnerability. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input. An attacker can exploit this vulnerability by manipulating the 'g2_itemId' parameter in the URL. By providing a crafted value, such as '/../../../../../../../etc/aliases%00', an attacker can traverse the directory structure and access sensitive files outside of the intended directory.

Accelerated Mortgage Manager SQL Injection Vulnerability

Accelerated Mortgage Manager is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before passing it on to SQL queries.Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Recent Exploits: