header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-site Scripting Vulnerabilities in Goollery

The application Goollery is affected by various cross-site scripting vulnerabilities. These vulnerabilities occur when user-supplied URI input is not properly sanitized. Attackers can exploit these vulnerabilities by sending malicious HTML and script code through the 'page' parameter of certain scripts. If a victim user follows a malicious URI link, the hostile code may be rendered in their web browser.

Helm Control Panel Multiple Vulnerabilities

Helm Control Panel is prone to multiple vulnerabilities including an SQL injection issue and an HTML injection vulnerability. A remote attacker can execute arbitrary HTML and script code in a user's browser. Manipulation of SQL queries to reveal or corrupt sensitive database data is possible as well.

Global Spy Software Cyber Web Filter IP Filter Bypass Vulnerability

The Global Spy Software Cyber Web Filter is affected by an IP filter bypass vulnerability. This vulnerability occurs due to a failure of the application to properly handle exceptional HTTP requests. An attacker can exploit this vulnerability to bypass filters based on IP addresses, enabling them to visit restricted websites.

Multiple Remote Vulnerabilities in Quake II

The vulnerabilities in Quake II are caused by boundary condition checking failures, access validation failures, and failures to handle exceptional conditions. An attacker can exploit these vulnerabilities to execute arbitrary code, trigger a denial of service condition, gain access to sensitive server files, and rejoin a server that they have been banned from.

Cross-Site Scripting Vulnerability in Google Desktop Search

The Google Desktop Search application fails to properly sanitize HTML tag content, allowing an attacker to execute arbitrary client-side script code in a user's browser. This can lead to theft of authentication credentials and other malicious activities.

Remote stack-based buffer-overflow vulnerabilities in libxml2

The 'libxml2' library is reported prone to multiple remote stack-based buffer-overflow vulnerabilities caused by insufficient boundary checks. Remote attackers may exploit these issues to execute arbitrary code on a vulnerable computer. The URI parsing functionality and the DNS name resolving code are affected.

Recent Exploits: