header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple Input Validation Vulnerabilities in Mambo Open Source

The vulnerabilities in Mambo Open Source are caused by a lack of proper input validation for user-supplied URI parameters. This allows an attacker to execute arbitrary server-side script code, perform cross-site scripting attacks, and carry out SQL injection attacks against the affected application.

SQL Injection Vulnerability in ReMOSitory module for Mambo

The ReMOSitory module for Mambo is prone to an SQL injection vulnerability. This vulnerability allows a malicious user to influence database queries and potentially view or modify sensitive information. In this case, it is possible for an attacker to disclose the administrator password hash.

Cross-Site Scripting Vulnerability in YaBB.pl Script

A remote attacker can create a malicious link containing arbitrary HTML and JavaScript code as URI parameters in the YaBB.pl script. When an unsuspecting user visits the link, the attacker's code will be executed in their browser in the context of the vulnerable website.

YaBB Administrator Command Execution Vulnerability

YaBB is affected by an administrator command execution vulnerability. This issue allows a remote attacker to create a malicious URI link or embed a malicious URI between IMG tags, which includes hostile YaBB administrative commands. If an unsuspecting forum administrator views a post that contains this IMG tag, they will inadvertently activate the malicious URI, and the attacker-supplied command is carried out with the administrator's privileges.

Denial of Service and Cross-Site Scripting Vulnerabilities in DNS4Me

DNS4Me is susceptible to a denial of service vulnerability where attackers can cause the web server to consume all available CPU resources and crash the application. Additionally, there is a cross-site scripting vulnerability due to the application's failure to properly sanitize user-supplied URI input. This allows remote attackers to create malicious URI links containing hostile HTML and script code, which can be rendered in the victim's web browser, potentially leading to theft of authentication credentials or other attacks.

Insecure Temporary File Creation in RsyncX

RsyncX is reported to contain an insecure temporary file creation vulnerability. The result of this is that temporary files created by the application may use predictable filenames. A local attacker may exploit this vulnerability to execute symbolic link file overwrite attacks.

Denial of Service vulnerability in Explorer.exe

A remote attacker can exploit a vulnerability in Explorer.exe on Microsoft Windows XP prior to Windows XP SP2 by presenting a malicious TIFF image to a victim user. When the image is processed, it consumes system resources and impacts the performance of the computer, resulting in a denial of service.

Recent Exploits: