header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Nortel Networks UNIStim IP Softphone Buffer Overflow Vulnerability

The Nortel Networks UNIStim IP Softphone application is prone to a buffer-overflow vulnerability. This is due to the application's failure to properly bounds-check user-supplied data before copying it to a memory buffer that is not sufficiently sized. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Asterisk ‘asterisk-addons’ SQL Injection Vulnerability

The 'asterisk-addons' package in Asterisk Open Source versions 1.2.x and 1.4.x is prone to an SQL injection vulnerability. The vulnerability occurs because the application fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit this vulnerability to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

InnovaShop Multiple Cross-Site Scripting Vulnerabilities

InnovaShop is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Multiple Cross-Site Scripting Vulnerabilities in InnovaShop

InnovaShop is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting in Stringbeans Portal

Stringbeans Portal is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Cross-Site Scripting Vulnerability in NETGEAR ProSafe SSL VPN Concentrator

The NETGEAR ProSafe SSL VPN Concentrator 25-SSL312 is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.

Buffer-Overflow Vulnerability in Live for Speed

The Live for Speed application is vulnerable to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the vulnerable application. Successful exploitation of this vulnerability can lead to remote attackers compromising affected computers. Failed exploit attempts may cause denial-of-service conditions.

qksmtp-rcpt-overflow-4444

Bind a remote cmd.exe on target host on 4444 port. This exploit is based on the original exploit discovered by Greg Linares. The shellcode used in this exploit is encoded using Skylined alpha2 tool. Credits to hdm and vlads902 for the original shellcode.

SQL Injection in Scott Manktelow Design Stride 1.0 Merchant

The Scott Manktelow Design Stride 1.0 Merchant application is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: