header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Utopia News Pro Multiple Cross-Site Scripting Vulnerabilities

Utopia News Pro is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. These may facilitate the theft of cookie-based authentication credentials as well as other attacks.

Remote Denial of Service Vulnerability in Mozilla Firefox

A remote denial of service vulnerability exists in Mozilla Firefox. The vulnerability occurs when the browser handles a specially crafted IFRAME. An attacker can exploit this vulnerability to crash the application or consume excessive CPU and memory resources on affected computers.

Local UTMP hostname spoofing vulnerability in gnome-pty-helper

The 'gnome-pty-helper' application is susceptible to a local UTMP hostname spoofing vulnerability. This allows users to spoof remote hostname information in UTMP records, potentially misdirecting administrators and users.

Remote sploit for Netscape Enterprise Server 4.0/sparc/SunOS 5.7

This is a remote exploit for Netscape Enterprise Server 4.0 on the sparc architecture running SunOS 5.7. The exploit allows an attacker to execute arbitrary commands on the target system. The attacker needs to provide a command line argument that will be executed on the target system. The exploit takes advantage of a vulnerability in the server to inject and execute the provided command. The command is encoded to replace bad characters. The exploit uses a shellcode to execute the command.

SQL Injection in AEwebworks aeDating

AEwebworks aeDating is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before it is used in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Recent Exploits: