header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CSSTidy and ImpressCMS Cross-Site Scripting Vulnerability

CSSTidy is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Cross-Site Scripting in RunCms

RunCms is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

Multiple Cross-Site Scripting Vulnerabilities in FireStats

FireStats is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

dotDefender Cross-Site Scripting Vulnerability

dotDefender is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

eliteCMS Multiple Cross-Site Scripting Vulnerabilities

eliteCMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Joomla! Rapid-Recipe HTML Injection Vulnerability

The Joomla! Rapid-Recipe component is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Cross-Site Scripting in Mac’s CMS

Mac's CMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

PHP COM extensions (inconsistent Win32) safe_mode bypass

This exploit allows an attacker to bypass the safe_mode restriction in PHP COM extensions on inconsistent Win32 systems. It utilizes the WScript.Shell COM object to execute a command provided through the 'cmd' parameter in the GET request. The output of the command is then saved to a file named 'suntzoi.txt' in the same directory as the script. The contents of the file are then displayed on the webpage.

Yappa PHP Photo Album Remote Command Execution Vulnerabilities

Yappa (Yet Another PHP Photo Album) is prone to multiple remote command-execution vulnerabilities because it fails to properly validate user-supplied input. An attacker can exploit these issues to execute arbitrary commands within the context of the vulnerable system.

Multiple Cross-Site Scripting Vulnerabilities in SimpNews

SimpNews is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Recent Exploits: