header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP JackKnife Input Validation Vulnerabilities

The PHP JackKnife application is prone to multiple input-validation vulnerabilities, including cross-site scripting (XSS) and SQL-injection issues. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

PHP JackKnife Multiple Input-Validation Vulnerabilities

PHP JackKnife is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

Heap-based Buffer Overflow and Denial-of-Service in Bochs

Bochs is prone to a heap-based buffer-overflow issue and a denial-of-service issue. The buffer-overflow issue occurs because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. The denial-of-service vulnerability is caused by a divide-by-zero operation. A local attacker can exploit these issues to execute arbitrary code in the context of the affected application or to cause denial-of-service conditions. Failed exploit attempts of the buffer-overflow vulnerability will also result in denial-of-service conditions.

Cross-site scripting vulnerability in Particle Gallery

The Particle Gallery application is prone to a cross-site scripting vulnerability due to inadequate sanitization of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary script code in the browser of an unsuspecting user, potentially leading to the theft of authentication credentials and other malicious activities.

Ovidentia 7.9.6 Multiple Vulnerabilities

SQL injection vulnerability: Log into admin panel and access delegate functionality > managing administrators where &id parameter (shown below link) is vulnerable to sql injection. CSRF vulnerability: log into the admin portal and access the create user functionality using csrf vulnerability it was possible to add new user.

F-Secure Policy Manager Server fsmsh.dll module DoS

The F-Secure Policy Manager Server is vulnerable to a denial-of-service attack. A malicious user can send a forged request to query a MS-DOS device name through the fsmsh.dll CGI module, causing the service to stop responding to legitimate users.

Particle Blogger SQL Injection Vulnerability

The Particle Blogger application is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

CVE-2002-1234

This code snippet demonstrates a buffer overflow vulnerability in the CVS server. The vulnerability allows an attacker to execute arbitrary code on the server with elevated privileges. The vulnerability exists in the serve[] array, where the retadd field is not properly validated before being used as a return address. By manipulating the retadd field, an attacker can control the execution flow and execute their own shellcode.

Recent Exploits: