header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sagem F@st 3304 Router Remote Information Disclosure Vulnerability

The Sagem F@st 3304 router is prone to a remote information-disclosure vulnerability because it fails to restrict access to sensitive information. A remote attacker can exploit this issue to obtain sensitive information, possibly aiding in further attacks.

BullGuard Multiple Products Arbitrary Write Privilege Escalation

This vulnerability allows an attacker to escalate privileges by overwriting the HAL dispatch table. By controlling the input buffer, the attacker can overwrite pointers in the table, which can be used to execute arbitrary code or gain elevated privileges. The vulnerability was discovered by Parvez Anwar and affects multiple BullGuard products. The affected versions range from 14.1.285.4 to 15.0.288.1. The vulnerability has a CVE ID of CVE-2014-9642. The vendor has released a fix for this vulnerability, which can be found at the provided URL. The fixed version is 15.0.288.1. The exploit was tested on a 32-bit Windows XP SP3 system. The vulnerability can be mitigated by updating to the fixed version of the software.

AVG Internet Security 2015 Arbitrary Write Privilege Escalation

The AVG Internet Security 2015 software allows an attacker to escalate privileges by overwriting the HAL dispatch table. By controlling the input buffer, the attacker can overwrite static pointers, leading to privilege escalation.

PHPJunkYard GBook Multiple Cross-Site Scripting Vulnerabilities

The PHPJunkYard GBook application is prone to multiple cross-site scripting vulnerabilities due to insufficient sanitization of user-supplied data. An attacker can exploit these vulnerabilities to execute arbitrary script code in the context of the affected site, potentially stealing authentication credentials and launching further attacks.

Support Incident Tracker SQL Injection Vulnerabilities

Support Incident Tracker is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

SQL Injection Vulnerabilities in Support Incident Tracker

Support Incident Tracker is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Multiple SQL-injection vulnerabilities in Support Incident Tracker

The application fails to properly sanitize user-supplied input before using it in an SQL query, leading to multiple SQL-injection vulnerabilities. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

SQL Injection in Support Incident Tracker

Support Incident Tracker is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

Recent Exploits: