header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PhpGroupWare HTML Injection Vulnerability

PhpGroupWare is susceptible to a HTML injection vulnerability due to improper input sanitization. An attacker can exploit this vulnerability by supplying malicious HTML and script code through the 'date' parameter in the 'index.php' page. This can lead to theft of cookie-based authentication credentials and control over the site's rendering.

Remote File Include Vulnerability in phpGroupWare

The phpGroupWare software is prone to a remote file include vulnerability that may allow an attacker to execute arbitrary PHP code. The vulnerability exists in the 'tables_update.inc.php' script, which includes other PHP files without proper validation. An attacker can exploit this vulnerability by supplying a malicious file parameter in the URL, leading to the execution of the included PHP code.

e_Board Directory Traversal Vulnerability

The e_Board application is vulnerable to a directory traversal vulnerability due to improper input sanitization. By including '../' directory traversal sequences and a NULL (%00) in the affected URI argument, an attacker can include the contents of arbitrary web-server readable files in the output of the requested page.

PHP shared memory module (shmop) Integer Handling Vulnerability

The PHP shared memory module (shmop) is prone to an integer handling vulnerability. The issue exists in the PHP_FUNCTION(shmop_write) function and is a result of a lack of sufficient sanitization performed on 'offset' data. This vulnerability may be exploited to make an almost arbitrary write into process memory. It is reported that the vulnerability may be leveraged to disable PHP 'safe mode', which may result in further compromise in a shared-server environment.

Local Privilege Escalation in diag

The vulnerability exists in diag applications due to a failure to implement security controls properly when executing an application specified by the 'DIAGNOSTICS' environment variable. A local attacker can exploit this vulnerability to gain superuser privileges on a computer running the affected software. The attacker can create a directory and set the 'DIAGNOSTICS' environment variable to that directory. Then, by executing a specially crafted script, the attacker can escalate their privileges and gain superuser access.

Input Validation Vulnerabilities in Kayako eSupport

Kayako eSupport is prone to multiple input validation vulnerabilities. One cross-site scripting and six SQL injection vulnerabilities. These issues may collectively threaten compromise of software and database security properties. Possible attacks include theft of cookie-based authentication credentials, exposure or modification of database information, and a potential for attacks against the underlying database implementation.

PCAL Buffer Overflow Vulnerability

PCAL is prone to a buffer overflow vulnerability. This issue occurs when the application processes a calendar file with excessively long lines. As calendar files can come from external or untrusted sources, this vulnerability is considered remote. Exploiting this vulnerability allows an attacker to execute arbitrary code within the context of the user running the affected application.

Unauthorized Command Execution in greed (Get and Resume Elite Edition)

The greed (Get and Resume Elite Edition) application is prone to unauthorized command execution. This vulnerability occurs when the application processes a GRX file list that contains shell metacharacters and commands in file names. An attacker can exploit this vulnerability by providing a malicious GRX file list, which may originate from an external or untrusted source. Successful exploitation allows the attacker to execute arbitrary commands within the context of the application.

Buffer Overflow Vulnerability in greed (Get and Resume Elite Edition)

The greed (Get and Resume Elite Edition) application is prone to a buffer overflow vulnerability. This vulnerability occurs when the client processes GRX file lists, which allow scripted file downloads. Since these file lists can come from external or untrusted sources, this vulnerability can be exploited remotely. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code within the application's context.

Recent Exploits: