header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows Media Player 11 local/remote DoS

Microsoft Windows Media Player is prone to a denial-of-service vulnerability when processing a malformed AU file. A remote attacker can exploit this issue to crash the affected application, denying service to legitimate users.

Microsoft Internet Explorer Denial-of-Service Vulnerability

Microsoft Internet Explorer is prone to a denial-of-service vulnerability because the application fails to handle certain HTML code. This issue is triggered when a remote attacker entices a victim user to visit a malicious website. Attackers may exploit this issue to crash Internet Explorer, effectively denying service to legitimate users.

Tor ControlPort torrc Rewrite Vulnerability

An attacker can exploit this issue to reconfigure Tor and significantly weaken the anonymity provided by the software. An attacker can inject malicious code into the Tor ControlPort to rewrite the torrc file, enabling debug logging and an erroneous ExitPolicy. This will allow the attacker to run a malicious program on the next boot.

Macromedia Shockwave 10 (SwDir.dll) Internet Explorer Denial of Service

This exploit causes a denial of service in Internet Explorer when a maliciously crafted Shockwave file is opened. The vulnerability is caused due to a boundary error in the handling of Shockwave files. This can be exploited to cause a stack-based buffer overflow by passing an overly long argument to the swURL property of the Shockwave ActiveX control.

Multiple Browsers Protocol Handler Injection Vulnerability

Multiple browsers are prone to vulnerabilities that let attackers inject commands through various protocol handlers. Exploiting these issues allows remote attackers to pass and execute arbitrary commands and arguments through processes such as 'cmd.exe' by employing various URI handlers. An attacker can exploit these issues to carry out various attacks by executing arbitrary commands on a vulnerable computer.

WebText <= 0.4.5.2 Remote Code Execution Exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable WebText 0.4.5.2 installation. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'go' parameter of the 'index.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an executable PHP code in the 'go' parameter.

Trillian Remote Command- and Code-Execution Vulnerabilities

Trillian is prone to remote command- and code-execution vulnerabilities because the application fails to properly handle user-supplied input via a registered URI. Successfully exploiting these issues allows attackers to execute arbitrary commands or code in the context of the affected application.

Recent Exploits: