header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Cimy Counter for WordPress HTTP Response-Splitting and Cross-Site Scripting Vulnerabilities

Cimy Counter for WordPress is prone to an HTTP response-splitting vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and influence how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.

Lois Software WebDB SQL Injection Vulnerability

Lois Software WebDB is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Microsoft Windows .doc File Malformed Pointers DoS

This exploit causes a denial of service (DoS) by crashing the Windows Explorer when a user hovers the mouse over a .doc file or views its properties. The vulnerability is present in the Ole32.dll file, specifically in the CMP DWORD PTR DS:[EAX+EBX],3 instruction, which allows arbitrary values to be set for EAX, EDX, and ESI registers. The exploit utilizes magic offsets at 4460 (EDX) and 4519 (ESI) to trigger the crash. It has been successfully tested on Windows 2000 SP4 FR and XP SP2 FR.

Trend Micro InterScan Web Security Virtual Appliance Multiple Vulnerabilities

Exploiting these issues can allow an attacker to download or upload arbitrary files to the system. This may aid in further attacks.

Cross-Site Scripting Vulnerability in Jamroom

Jamroom is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Linksys WAP54Gv3 Wireless Router Cross-Site Scripting Vulnerability

The Linksys WAP54Gv3 Wireless Router is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. Attackers may exploit this issue by enticing victims into visiting a malicious site. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected device. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

SoftComplex PHP Event Calendar Remote Security Vulnerabilities

Attackers can exploit these issues to obtain sensitive information, upload arbitrary files, execute arbitrary script code, steal cookie-based authentication credentials, and perform certain administrative actions.

webConductor SQL Injection Vulnerability

The webConductor application is prone to an SQL-injection vulnerability due to insufficient sanitization of user-supplied data before using it in an SQL query. Exploiting this vulnerability can allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: