header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Denial of Service Vulnerability in VocalTec VGW120 and VGW480 Telephony Gateways

The VocalTec VGW120 and VGW480 Telephony Gateways are prone to a remote denial of service vulnerability. The issue is reported to exist in the ASN.1/H.323/H.225 stack. A remote attacker may exploit this issue to deny service to the affected appliances.

cPanel Privilege Escalation Vulnerability

cPanel is reported prone to a privilege escalation vulnerability. It is reported that the options used by cPanel to compile Apache 1.3.29 and PHP using the mod_phpsuexec option are insecure. These settings will reportedly permit a local attacker to execute arbitrary code as any user who possesses a PHP file that is published to the Apache web server.

Liferay Enterprise Portal Multiple XSS and HTML Injection Vulnerabilities

Liferay Enterprise Portal is vulnerable to multiple cross-site scripting (XSS) and HTML injection vulnerabilities. These vulnerabilities occur because user-supplied data from various input fields is included in server-generated content without proper validation or encoding. This allows for typical XSS attacks against other users of the portal.

e107 website system remote HTML injection vulnerability

The e107 website system is prone to a remote HTML injection vulnerability. This vulnerability occurs when a user supplies malicious HTML or script code to the application using a URI parameter of the log.php script. The application fails to properly sanitize user-supplied input, allowing the injected HTML code to be stored and rendered in the browser of unsuspecting users when the log page of the affected site is viewed.

ActiveState Perl Integer Overflow Vulnerability

ActiveState Perl is prone to an integer overflow vulnerability. It occurs due to a lack of sufficient bounds checking on multiplier data passed to a Perl duplicator statement. This vulnerability allows an attacker to influence the execution flow of a vulnerable Perl script and execute arbitrary code. Failed exploit attempts will result in a denial of service.

Recent Exploits: