header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cross-Site Scripting in PHP Code Snippet Library

The PHP Code Snippet Library is prone to multiple cross-site scripting vulnerabilities. These vulnerabilities exist due to a lack of proper sanitization of user-supplied URI input. An attacker can exploit these vulnerabilities by creating a malicious URI link that includes hostile HTML and script code. When a victim user follows this link, the malicious code may be executed in the context of the affected website, potentially leading to the theft of authentication credentials or other attacks.

WebAPP Directory Traversal Vulnerability

WebAPP is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input data. An attacker can exploit this vulnerability to retrieve arbitrary, potentially sensitive files from the hosting computer with the privileges of the webserver. In this case, the attacker could retrieve DES-encrypted password hashes for all users of the application, aiding them in further attacks.

Microsoft Internet Explorer Resource Existence Determination Weakness

An attacker can use an IFRAME that is accessible within the same domain and change its URI to the location of a file or directory. The attacker can then determine the existence of the resource by the error message returned by Internet Explorer. This weakness can then allow the attacker to carry out other attacks against a vulnerable computer.

GNU a2ps Filename Command-Execution Vulnerability

GNU a2ps is affected by a filename command-execution vulnerability. This issue is due to the application's failure to properly sanitize filenames.An attacker might leverage this issue to execute arbitrary shell commands with the privileges of an unsuspecting user running the vulnerable application.Although this issue reportedly affects only a2ps version 4.13, other versions are likely affected as well.$ touch 'x`echo >&2 42`.c'$ a2ps -o /dev/null *.c42[x`echo >&2 42`.c (C): 0 pages on 0 sheets][Total: 0 pages on 0 sheets] saved into the file `/dev/null'

Cross-Site Scripting Vulnerability in Plesk Reloaded

The application fails to properly sanitize user-supplied URI input, allowing a remote attacker to create a malicious URI link containing hostile HTML and script code. When followed, this link can render the hostile code in the victim user's web browser, potentially leading to theft of authentication credentials or other attacks.

Gadu-Gadu Instant Messenger File Extension Obfuscation Vulnerability

The Gadu-Gadu instant messenger application contains a weakness that allows attackers to obfuscate file extensions. This vulnerability can be exploited by sending potentially malicious executable files to users who believe they are harmless files.

eGroupWare Multiple Cross-Site Scripting and HTML Injection Vulnerabilities

eGroupWare is susceptible to multiple cross-site scripting and HTML injection vulnerabilities. The cross-site scripting issues exist in the 'addressbook' and 'calendar' modules, as well as in the 'Search' functionality of the 'addressbook', 'calendar', and 'search between projects' modules. The HTML injection vulnerabilities are present in the 'Messenger' and 'Ticket' modules. These vulnerabilities can be exploited by attackers to steal cookie-based authentication credentials and manipulate web content.

Directory Traversal Vulnerability in HTTP POST Requests

A directory-traversal vulnerability in HTTP POST requests. This attack is demonstrated by an anonymous user calling protected administration scripts. This bypasses authentication checks and gives anonymous users remote administration of the devices.

Recent Exploits: