header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Liferay Enterprise Portal Multiple XSS and HTML Injection Vulnerabilities

Liferay Enterprise Portal is vulnerable to multiple cross-site scripting (XSS) and HTML injection vulnerabilities. These vulnerabilities occur because user-supplied data from various input fields is included in server-generated content without proper validation or encoding. This allows for typical XSS attacks against other users of the portal.

e107 website system remote HTML injection vulnerability

The e107 website system is prone to a remote HTML injection vulnerability. This vulnerability occurs when a user supplies malicious HTML or script code to the application using a URI parameter of the log.php script. The application fails to properly sanitize user-supplied input, allowing the injected HTML code to be stored and rendered in the browser of unsuspecting users when the log page of the affected site is viewed.

ActiveState Perl Integer Overflow Vulnerability

ActiveState Perl is prone to an integer overflow vulnerability. It occurs due to a lack of sufficient bounds checking on multiplier data passed to a Perl duplicator statement. This vulnerability allows an attacker to influence the execution flow of a vulnerable Perl script and execute arbitrary code. Failed exploit attempts will result in a denial of service.

OmniHTTPD GET Request Buffer Overflow

OmniHTTPD is affected by a GET request buffer overflow vulnerability. This issue occurs due to a failure of the application to properly validate string sizes when processing user input. An attacker could exploit this vulnerability to execute arbitrary code with the privileges of the affected web server.

Buffer Overflow Vulnerability in ActiveState Perl and Perl for cygwin

A buffer overflow vulnerability exists in ActiveState Perl and Perl for cygwin due to a lack of sufficient bounds checking on data passed to the Perl system() function call. This vulnerability allows an attacker to manipulate the execution flow of a vulnerable Perl script and execute arbitrary code. The arbitrary code execution occurs within the context of the user running the malicious Perl script.

PHP-Nuke File Include Vulnerability

The PHP-Nuke application is prone to a potential file include vulnerability. This vulnerability allows a remote attacker to include malicious files that contain arbitrary code, which can be executed on a vulnerable system. The vulnerability is exploited by manipulating the 'modpath' parameter in the application's URL.

osCommerce Directory Traversal Vulnerability

osCommerce has a directory-traversal vulnerability that allows a remote attacker to possibly obtain sensitive information. The software improperly sanitizes user-supplied input and allows '../' directory-traversal character sequences when serving files. This allows the attacker to access files outside of the application document root, potentially allowing the attacker to view files that contain sensitive information or aid them in further attacks on the computer.

Recent Exploits: