header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Free File Hosting Remote File Include Vulnerabilities

The Free File Hosting application fails to properly sanitize user-supplied data, leading to multiple remote file-include vulnerabilities. Exploiting these vulnerabilities can result in compromising the application and the underlying system, as well as enabling other types of attacks.

KDE Konqueror Information Disclosure Vulnerability

KDE Konqueror is prone to a vulnerability that may allow attackers to obtain potentially sensitive information. A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.

Information Disclosure in Opera

Opera is prone to a vulnerability that may allow attackers to obtain potentially sensitive information. A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.

w-Agora Multiple Input-Validation Vulnerabilities

w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues. These vulnerabilities exist because the application fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Multiple input-validation vulnerabilities in w-Agora

w-Agora is prone to multiple input-validation vulnerabilities, including possible SQL-injection issues and multiple cross-site scripting issues. These vulnerabilities are caused by a failure to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Local File Include and Authentication Bypass Vulnerabilities in LedgerSMB/SQL-Ledger

The LedgerSMB/SQL-Ledger application fails to sufficiently sanitize user-supplied input, leading to a local file-include vulnerability. Additionally, SQL-Ledger is prone to an authentication-bypass vulnerability. An attacker can exploit these vulnerabilities to view files, execute arbitrary local scripts within the webserver context, and potentially gain unauthorized access to the affected application.

Input Validation Vulnerabilities in PHPX

PHPX is prone to multiple input-validation vulnerabilities because the application fails to properly sanitize user-supplied input. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, execute arbitrary script code in the context of the webserver process, compromise the application, obtain sensitive information, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Recent Exploits: