header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

A-Cart Multiple Input Validation Vulnerabilities

A-Cart is prone to multiple input validation vulnerabilities. These issues are due to a failure of the application to properly sanitize user supplied input prior to its use in SQL queries and generation of dynamic content. The SQL injection issue may allow a remote attacker to manipulate SQL query logic, potentially leading to access to sensitive information such as the administrator password hash or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation. The cross-site scripting issue could permit a remote attacker to create a malicious link to the vulnerable application that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

Multiple SQL Injection, Cross-Site Scripting, and HTML Injection Vulnerabilities in Photopost PHP Pro

The application is prone to multiple vulnerabilities including SQL injection, cross-site scripting, and HTML injection. These vulnerabilities may allow an attacker to execute arbitrary HTML or script code in a user's browser and/or influence SQL query logic to disclose sensitive information and carry out other attacks.

AIX invscoutd Insecure Temporary File Handling Vulnerability

The AIX invscoutd process insecurely handles temporary files, allowing a local attacker to destroy data on the vulnerable system. This is due to a design error that allows a user to specify a log file that the process writes to while holding escalated privileges. A malicious user can exploit this issue to corrupt arbitrary files on the affected system, potentially leading to a system-wide denial of service. There is also a possibility that an attacker could gain escalated privileges, although this has not been confirmed.

Directory Traversal Vulnerability in HP Web JetAdmin

HP Web JetAdmin is prone to a directory traversal vulnerability that allows remote attackers to access information outside the server root directory. This vulnerability occurs due to insufficient sanitization of user-supplied data passed via the 'setinclude' parameter of the 'setinfo.hts' script. Attackers can exploit this vulnerability to upload malicious files and gain unauthorized access to a vulnerable server.

Nexgen FTP Server Remote Directory Traversal Vulnerability

The Nexgen FTP server is prone to a remote directory traversal vulnerability. This vulnerability allows authenticated users to bypass file request string sanitization and gain access to sensitive information on the server. An attacker can exploit this vulnerability to launch further attacks on the system.

FirstClass HTTP Server Cross-Site Scripting Vulnerability

The FirstClass HTTP Server is prone to a cross-site scripting vulnerability that may allow a remote attacker to execute arbitrary HTML or script code in a user's browser. The vulnerability is caused by insufficient sanitization of user-supplied data via the 'TargetName' parameter of the 'Upload.shtml' script. An attacker can exploit this issue by injecting malicious code into the 'TargetName' parameter, which will be executed in the context of the user's browser when the vulnerable script is accessed.

Local Buffer Overflow in ‘man’ command

The 'man' command is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. Exploiting this issue allows attackers to execute malicious machine code with the privileges of the 'man' utility. This can result in the compromise of affected computers. Failed exploit attempts will likely result in denial-of-service conditions.

Recent Exploits: