header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cisco PIX Denial-of-Service Vulnerability

Cisco PIX is susceptible to a remote denial-of-service vulnerability when handling certain TCP SYN packets. This issue allows attackers to temporarily block network traffic to arbitrarily targeted TCP services. By repeating the attack, a prolonged denial-of-service condition is possible.

PHP-Post Multiple Cross-Site Scripting Vulnerabilities

PHP-Post is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. The attacker may also be able to steal cookie-based authentication credentials and launch other attacks.

PHP-Post Cross-Site Scripting Vulnerabilities

The PHP-Post application fails to properly sanitize user-supplied input, leading to multiple cross-site scripting vulnerabilities. An attacker can exploit these vulnerabilities to execute arbitrary script code in the browser of a victim user, potentially stealing authentication credentials and launching further attacks.

PHP Download Manager SQL Injection Vulnerability

The PHP Download Manager application fails to properly sanitize user-supplied input before using it in an SQL query. This allows an attacker to inject malicious SQL code through the 'cat' parameter in the 'files.php' script. Successful exploitation of this vulnerability could lead to a compromise of the application, unauthorized access to or modification of data, or the exploitation of other vulnerabilities in the underlying database implementation.

Cross-Site Scripting Vulnerability in Struts

The Struts application fails to properly sanitize user-supplied input, leading to a cross-site scripting vulnerability. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of a user visiting the affected site. This can be used to steal authentication credentials and carry out further attacks.

SimplePoll SQL Injection Vulnerability

SimplePoll is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. The vulnerability can be exploited by using a specially crafted payload in the 'pollid' parameter.

Buffer Overflow Vulnerability in Inkscape

Inkscape is prone to a buffer overflow vulnerability. This issue occurs when the application fails to do proper bounds checking on user-supplied data before copying it into a finite-sized buffer. When a malformed SVG image file is processed, it leads to a buffer overflow, allowing an attacker to execute arbitrary code in the context of the victim user.

Recent Exploits: