header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sun Java Runtime Environment Remote Privilege-Escalation Vulnerability

The Sun Java Runtime Environment is prone to a remote privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the user who invoked the Java applet. Successfully exploiting this issue may result in the remote compromise of affected computers.

Systeme de vote pour site Web Remote File Include Vulnerabilities

The 'Systeme de vote pour site Web' application is prone to multiple remote file-include vulnerabilities due to insufficient sanitization of user-supplied input. Exploiting these issues may allow an attacker to compromise the application and the underlying system, and other attacks are also possible.

Apache Tomcat Host Manager Servlet Cross-Site Scripting Vulnerability

The Apache Tomcat Host Manager Servlet is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to inject HTML and script code into the browser of an unsuspecting victim. The attacker may then steal cookie-based authentication credentials and launch other attacks.

JobLister3 SQL Injection Vulnerability

The JobLister3 application is vulnerable to SQL injection attacks. This vulnerability occurs due to the application's failure to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by injecting malicious SQL statements into the 'jobid' parameter of the 'showbyID' mode. Successful exploitation could allow the attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

OWASP Stinger Filter-Bypass Weakness

OWASP Stinger is prone to a filter-bypass weakness because the application fails to properly handle certain input. Since the OWASP Stinger project is a software module designed to be incorporated into other applications, this weakness may be exploitable only if applications use it in a vulnerable way. Successfully exploiting this issue may allow attackers to bypass the filter, aiding them in further attacks.

Recent Exploits: