header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TWiki Multiple Cross-Site Scripting Vulnerabilities

TWiki is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Multiple Cross-Site Scripting Vulnerabilities in TWiki

TWiki is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

Multiple reflecting XSS-, SQLi and InformationDisclosure-vulnerabilities in Zeuscart v.4

ECommerce-Shopping Cart Zeuscart v. 4 suffers from multiple XSS-, SQLi- and InformationDisclosure-vulnerabilities. Reflecting XSS-vulnerabilities can be found in a common Zeuscart-installation in the parameter 'search', 'schltr', and 'brand' in the index.php file. SQL injection vulnerabilities can be found in the administrative backend of Zeuscart v. 4 in the 'id' parameter.

Zyncro social network SQL Injection Vulnerability

Zyncro social network is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

HTML-injection vulnerabilities in Zyncro

Zyncro is prone to multiple HTML-injection vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker could exploit these vulnerabilities to execute arbitrary script code in the browser of an unsuspecting victim in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials or control how the site is rendered to the user. Other attacks are also possible.

dproxy-nexgen remote root exploit (x86-lnx)

This exploit targets the dproxy-nexgen software and allows remote attackers to execute arbitrary code with root privileges. The exploit works by sending a specially crafted packet to the target system, triggering a buffer overflow vulnerability and executing a shellcode payload. The exploit has been tested on the dproxy-nexgen (.tar.gz) version of the software.

phpRS Multiple SQL Injection and Cross-Site Scripting Vulnerabilities

The phpRS application is prone to multiple SQL-injection vulnerabilities and multiple cross-site scripting vulnerabilities. These vulnerabilities occur due to insufficient sanitization of user-supplied data. Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Recent Exploits: