header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Internet Explorer Cross-Zone Scripting Vulnerability

It has been reported that Microsoft Internet Explorer may be prone to a cross-zone scripting vulnerability that could ultimately lead to execution of malicious script code and Active Content in the context of the My Computer Zone or a foreign domain. Reportedly, hostile code can be executed in the context of the Media Bar via the '_media' property of the 'window.open' method. Cross-Site scripting attacks are possible as well. This functionality is only available in Internet Explorer 6 and above. Additional proof of concept for cross site scripting has been supplied as well.

Microsoft Internet Explorer Cross Frame Scripting Restriction Bypass

Microsoft Internet Explorer is reported to be prone to an issue that may leak sensitive information across foreign domains. This issue could permit framesets in different domains to leak various events, including keyboard events. This could effectively permit a hostile web page to capture keystrokes from a foreign domain.

Symantec Gateway Security Web Based Management Console Cross-Site Scripting Vulnerability

A vulnerability has been reported to exist in the Symantec Gateway Security Web based management console that may allow a remote user to launch cross-site scripting attacks. The issue is reported to exist due to improper sanitizing of user-supplied data. It has been reported that HTML and script code passed to the Symantec Gateway Security Web based management console via a specially crafted URI, may be incorporated into dynamic content of a server error page. Successful exploitation of this vulnerability may allow an attacker to steal cookie-based authentication credentials.

Serv-U FTP Server Remote Stack Based Buffer Overflow

Serv-U FTP Server is prone to a remote stack-based buffer overflow vulnerability when handling time zone arguments passed to the MDTM FTP command. An attacker can leverage this issue to execute arbitrary instructions in the context of the SYSTEM user.

Serv-U FTP Server Remote Stack Based Buffer Overflow Vulnerability

Serv-U FTP Server has been reported prone to a remote stack based buffer overflow vulnerability when handling time zone arguments passed to the MDTM FTP command. The problem exists due to insufficient bounds checking. Ultimately an attacker may leverage this issue to have arbitrary instructions executed in the context of the SYSTEM user.

mformat Privilege Escalation Vulnerability

It has been reported that mformat is prone to a privilege escalation vulnerability when installed as a setUID application. This issue is due to a design error allowing a user to create any arbitrary files as the root user. A local attacker could exploit this issue by forcing the creation of sensitive system files that already exist. When the application formats the specified files, the target system file will be overwritten, destroying sensitive system data. Since the files that are given permissions 0666 and owned by root, the attacker may alter overwritten system configuration files, allowing for a escalation of privileges.

GWeb Directory Traversal Vulnerability

It has been reported that GWeb is prone to a directory traversal vulnerability. The issue is due to the server's failure to properly validate user supplied http requests. This issue may allow an attacker to escape the web server root directory and view any web server readable files. Information acquired by exploiting this issue may be used to aid further attacks against a vulnerable system.

GameSpy SDK Remote Denial of Service Vulnerability

It has been reported that the GameSpy SDK is prone to a remote denial of service vulnerability. This issue is due to the software failing to handle exceptional conditions during network communication. Exploitation of this issue may cause the affected GameSpy developed game to crash, denying service to legitimate users.

FlexWATCH Cross-Site Scripting Vulnerability

It has been reported that FlexWATCH may be prone to a cross-site scripting vulnerability that may allow a remote attacker to execute arbitrary HTML or script code in a user's browser. An example of this vulnerability is demonstrated by sending a malicious URL containing a script to a user, which when clicked, will execute the script in the user's browser.

Ghost Recon Game Engine Denial of Service Vulnerability

The Ghost Recon Game Engine has been reported prone to a denial of service vulnerability. When handling text strings, the Ghost Recon Game Engine employs a 32-bit integer string size prefix in order to monitor the size of the string. It has been reported that when an invalid size value is supplied an exception will be triggered causing a system wide denial of service.

Recent Exploits: