header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TagIt! TagBoard Remote File Include Vulnerabilities

TagIt! TagBoard is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data. Exploiting these issues may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Cross-Site Scripting Vulnerability in Atlassian JIRA

The Atlassian JIRA application is prone to a cross-site scripting vulnerability due to inadequate input sanitization. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected site. This can lead to the execution of malicious scripts in the browser of unsuspecting users, potentially allowing the attacker to steal authentication credentials and launch further attacks.

Arbitrary File Upload Vulnerability in eXtreme File Hosting

The eXtreme File Hosting application fails to sufficiently sanitize user-supplied input, allowing an attacker to upload and execute arbitrary PHP script code in the context of the affected webserver process. This can lead to the compromise of the application and enable other possible attacks.

Sage Extension Feed HTML-injection vulnerability

The Sage Extension Feed application fails to properly sanitize user-supplied input before using it in dynamically generated content, leading to an HTML-injection vulnerability. Hostile HTML and script code can be injected into vulnerable sections of the application, which can be rendered in the browser of a user viewing a malicious RSS feed.

Coppermine Photo Gallery Multiple Remote and Local File Include Vulnerabilities

Coppermine Photo Gallery is prone to multiple remote and local file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker can exploit these issues to execute arbitrary PHP code in the context of the webserver process. This may facilitate a remote compromise of the underlying system; other attacks are also possible.

Multiple remote file-include vulnerabilities in PortailPHP

PortailPHP is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input. A successful exploit of these issues allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

PortailPHP Multiple Remote File Include Vulnerabilities

The PortailPHP application is prone to multiple remote file-include vulnerabilities due to improper sanitization of user-supplied input. An attacker can exploit these vulnerabilities to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process, potentially leading to unauthorized access. The specific vulnerability occurs in PortailPHP 2, but other versions may also be affected.

Recent Exploits: