header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Virtual Host Administrator Remote File-Include Vulnerability

Virtual Host Administrator is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Mac OS X QuickDraw Remote Memory-Corruption Vulnerability

The vulnerability exists in Mac OS X QuickDraw due to its failure to handle malformed PICT image files correctly. This can be exploited by remote attackers to corrupt memory and crash the affected software. It may also potentially allow the execution of arbitrary machine code, although this has not been confirmed.

212Cafe Guestbook Cross-Site Scripting Vulnerability

The 212Cafe Guestbook application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability by injecting arbitrary script code into the affected site, which can then be executed in the browser of an unsuspecting user. This allows the attacker to potentially steal authentication credentials and launch further attacks.

Cross-site scripting vulnerabilities in Bitweaver

Bitweaver is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

SQL Injection Vulnerability in Unique Ads

The Unique Ads application is vulnerable to SQL injection due to improper sanitization of user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Recent Exploits: