header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Global Spy Software Cyber Web Filter IP Filter Bypass Vulnerability

The Global Spy Software Cyber Web Filter is affected by an IP filter bypass vulnerability. This vulnerability occurs due to a failure of the application to properly handle exceptional HTTP requests. An attacker can exploit this vulnerability to bypass filters based on IP addresses, enabling them to visit restricted websites.

Multiple Remote Vulnerabilities in Quake II

The vulnerabilities in Quake II are caused by boundary condition checking failures, access validation failures, and failures to handle exceptional conditions. An attacker can exploit these vulnerabilities to execute arbitrary code, trigger a denial of service condition, gain access to sensitive server files, and rejoin a server that they have been banned from.

Cross-Site Scripting Vulnerability in Google Desktop Search

The Google Desktop Search application fails to properly sanitize HTML tag content, allowing an attacker to execute arbitrary client-side script code in a user's browser. This can lead to theft of authentication credentials and other malicious activities.

Remote stack-based buffer-overflow vulnerabilities in libxml2

The 'libxml2' library is reported prone to multiple remote stack-based buffer-overflow vulnerabilities caused by insufficient boundary checks. Remote attackers may exploit these issues to execute arbitrary code on a vulnerable computer. The URI parsing functionality and the DNS name resolving code are affected.

LinuxStat Directory Traversal Vulnerability

LinuxStat is vulnerable to a directory traversal vulnerability. Attackers can exploit this vulnerability by using '../' directory traversal sequences in the affected URI argument, which can cause the inclusion of potentially sensitive web-server readable files in the output of the requested page. This can lead to information disclosure and further attacks.

MoniWiki Cross-Site Scripting Vulnerability

MoniWiki is prone to a cross-site scripting vulnerability due to improper sanitization of user-supplied URI input. An attacker can create a malicious URI link containing hostile HTML and script code. When a victim user follows this link, the code may be executed in their browser, potentially allowing the attacker to steal authentication credentials or launch other attacks.

OpenWFE Cross-Site Scripting and Connection Proxy Vulnerability

The OpenWFE application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. This can be exploited by an attacker to steal authentication credentials and execute malicious code in a user's browser. Additionally, OpenWFE is also affected by a connection proxy vulnerability, allowing anonymous scanning of network computers.

Information Disclosure Vulnerability in Netbilling ‘nbmember.cgi’ script

The Netbilling 'nbmember.cgi' script is prone to an information disclosure vulnerability. This vulnerability can be exploited by remote attackers to gain access to user authentication credentials and potentially sensitive configuration information.

Recent Exploits: