header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla! RSS Feed Reader Remote File Include Vulnerability

The Joomla! RSS Feed Reader is vulnerable to a remote file-include vulnerability. This occurs due to insufficient sanitization of user-supplied input. An attacker can exploit this vulnerability by injecting malicious code into the 'mosConfig_live_site' parameter of the 'admin.wmtrssreader.php' file. Successful exploitation could allow the attacker to compromise the application and the underlying system, potentially leading to further attacks.

Linksys SPA941 HTML Injection Vulnerability

Linksys SPA941 devices are prone to an HTML-injection vulnerability because the built-in webserver fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.

Multiple Cross-Site Scripting Vulnerabilities in DNews

DNews is prone to multiple cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Remote Buffer Overflow Vulnerability in AlsaPlayer

AlsaPlayer is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer. Exploiting this issue allows attackers to execute arbitrary machine code in the context of users running the affected application.

Cross-Site Scripting in SNewsCMS

SNewsCMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Remote Buffer-Overflow Vulnerability in Nagios Plugins

The Nagios Plugins software is vulnerable to a remote buffer-overflow vulnerability. Attackers can exploit this vulnerability to execute arbitrary machine code in the context of the affected users. The vulnerability exists due to the software's failure to properly bounds-check user-supplied data before copying it to a buffer that is not large enough.

Command-execution vulnerability in Microsoft Windows XP and Server 2003 with Internet Explorer 7

The vulnerability allows remote attackers to execute arbitrary commands in the context of users that follow malicious URIs. Attack vectors include following URIs in Mozilla Firefox, Skype, Adobe Acrobat Reader, Miranda, Netscape, and mIRC. The issue in BID 25543 (Mozilla Firefox 2.0.0.6 Unspecified Protocol Handling Command Injection Vulnerability) can also be exploited as an attack vector for this issue.

Dawn of Time MUD Server Multiple Format-String Vulnerabilities

The Dawn of Time MUD server is prone to multiple format-string vulnerabilities. Exploiting these issues will allow attackers to execute arbitrary code with the permissions of a user running the application. Failed attacks will likely cause denial-of-service conditions.

Recent Exploits: