header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BroadBoard Message Board SQL Injection Vulnerabilities

The BroadBoard Message Board is affected by multiple SQL injection vulnerabilities. These vulnerabilities occur due to a failure in sanitizing user-supplied input before using it in an SQL query. An attacker can exploit these vulnerabilities to manipulate SQL queries, potentially revealing or corrupting sensitive database data. Additionally, these vulnerabilities can facilitate attacks against the underlying database software.

Multiple SQL Injection Vulnerabilities in BroadBoard Message Board

The BroadBoard Message Board is affected by multiple SQL injection vulnerabilities. These vulnerabilities are caused by the application's failure to properly sanitize user-supplied URI input before using it in an SQL query. An attacker can exploit these vulnerabilities to manipulate SQL queries, potentially exposing or corrupting sensitive database data. Additionally, these vulnerabilities may also enable attacks against the underlying database software.

Alt-N MDaemon Remote Buffer Overflow Vulnerabilities

Alt-N MDaemon is prone to multiple remote buffer overflow vulnerabilities. The vulnerabilities are likely due to a failure of the application to properly validate buffer sizes when processing command argument input. By sending a large argument to certain SMTP commands or an IMAP command, it is possible to cause the application to crash or execute arbitrary code with the privileges of the user running the server on an affected computer.

LaTeX2rtf Remote Buffer Overflow Vulnerability

LaTeX2rtf is susceptible to a remote buffer overflow vulnerability when handling malformed files. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable computer to gain unauthorized access. The issue is due to a failure of the application to perform proper bounds checks before copying data into a fixed-sized memory buffer.

Remote Denial of Service in Pinnacle Systems ShowCenter Web-based Interface

The Pinnacle Systems ShowCenter web-based interface is prone to a remote denial of service vulnerability. The vulnerability exists due to a lack of sanity checks on the Skin parameter of a ShowCenter script. A remote attacker can exploit this vulnerability to persistently deny service to the ShowCenter web-based interface. Any subsequent request to the interface after the attack will result in a 'File or Folder not found' error message.

LeadMind Pop Messenger Remote Denial of Service Vulnerability

LeadMind Pop Messenger is prone to a remote denial of service vulnerability. The issue exists because the messenger application fails to gracefully handle certain characters that are received. A remote attacker may exploit this vulnerability to crash the LeadMind Pop Messenger client. Additionally, it is reported that an attacker may broadcast a malicious message to all clients on the connected local network segment and deny service to all of the clients at once.

EmuLive Server4 Authentication Bypass and Denial of Service Vulnerabilities

An attacker can exploit an authentication bypass vulnerability in EmuLive Server4 to gain unauthorized access to administrator scripts, allowing manipulation of server settings. Additionally, a denial of service vulnerability can be exploited to freeze the affected computer, denying service to legitimate users.

Multiple Remote Input-Validation Vulnerabilities in Tutos

Tutos is reported to have multiple remote input-validation vulnerabilities. These vulnerabilities occur due to the inadequate sanitization of user-supplied data, which allows attackers to perform cross-site scripting and SQL injection attacks.

Recent Exploits: