header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MTCMS <= 2.0 Remote File Include Exploit

This exploit allows remote attackers to execute arbitrary files on the target system by including a malicious file through the admin_settings.php script in MTCMS <= 2.0. The vulnerability arises due to the lack of proper input sanitization, allowing an attacker to specify a remote file to be included and executed on the server.

LEADTOOLS Multimedia ActiveX Control Method Stack-based Buffer Overflow Vulnerability

LEADTOOLS Multimedia is prone to a stack-based buffer-overflow vulnerability because the software fails to adequately check boundaries on data supplied to an ActiveX control method. An attacker can exploit this issue to execute arbitrary code in the context of a user running the application. Failed attempts will likely result in denial-of-service conditions.

Cross-Site Scripting Vulnerability in VP-ASP Shopping Cart

VP-ASP Shopping Cart is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

Computer Associates BrightStor ARCserve Backup Denial-of-Service Vulnerability

Computer Associates BrightStor ARCserve Backup is prone to multiple denial-of-service vulnerabilities due to memory-corruption issues caused by errors in processing arguments passed to RPC procedures. A remote attacker may exploit these issues to crash the affected services, resulting in denial-of-service conditions.

Personal Firewall Protection Bypass Vulnerability

The vulnerability allows attackers to bypass protection mechanisms implemented by personal firewall products. It occurs due to the improper implementation of protection mechanisms based on valid process identifiers. By exploiting this vulnerability, local attackers can bypass protection mechanisms and gain elevated privileges, allowing them to execute arbitrary code. Other attacks may also be possible.

Recent Exploits: