header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OpenBase Buffer-Overflow and Remote Command Execution Vulnerabilities

The OpenBase software is prone to a buffer-overflow vulnerability and multiple remote command-execution vulnerabilities. An attacker can exploit these issues to execute arbitrary code or commands with superuser privileges, leading to the complete compromise of affected computers. The vulnerabilities allow for commands to be run as root and for root-owned files to be created. Additionally, there is an issue with the 'zone_free()' function referencing a specific memory address. Another vulnerability allows for commands to be executed as root when using the 'OEMLicenseInstall()' function.

Cross-Site Scripting Vulnerability in JLMForo System

JLMForo System is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

SQL Injection vulnerability in E-Vendejo

The E-Vendejo application is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Helios Calendar Cross-Site Scripting Vulnerability

The Helios Calendar application is prone to a cross-site scripting vulnerability. This vulnerability occurs due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability to execute arbitrary HTML or script code in the context of a user's browser session on an affected site. This can lead to the theft of cookie-based authentication credentials and enable further attacks.

Recent Exploits: