header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Reports Server Information Disclosure

Reports Server is vulnerable to an information disclosure vulnerability. Under some circumstances, Reports Server may yield sensitive information to unauthenticated remote users. This information may include the system path, software installed on the vulnerable system, and other information that may be used as points of entry.

Bypassing VirusWall Scanning Mechanism

A vulnerability has been reported in certain VirusWall versions. Reportedly, it is possible to bypass the scanning mechanism of VirusWall by adding extraneous spaces in certain email HTTP header fields. A malicious email server may add extraneous whitespace in certain email headers. This would cause VirusWall to ignore the malicious email and not scan it. However, many popular email client programs, including Outlook, will ignore this header and display the content regardless. This may allow malicious content to bypass VirusWall and still be interpreted by a client system.

Python Pickle Module Vulnerability

A vulnerability has been reported in the Pickle implementation included with some versions of Python. If specially crafted malicious object data is 'unpickled', it may cause arbitrary Python commands to be executed, including system calls. This is accomplished by specifying an available function as the class constructor.

Macromedia Sitespring Cross-Site Scripting Vulnerability

A cross-site scripting issue has been reported in the default error page used by Sitespring. When an HTTP 500 error is returned, some user-supplied data is included in the generated HTML. Since this data isn't properly sanitized, an attacker may be able to include arbitrary HTML, including JavaScript.

Oddsock Song Requester 2.1 Buffer Overflow

A vulnerability has been reported for Oddsock Song Requester 2.1, where an attacker can make a request to 'request.cgi' using a long value for the 'listpos' parameter, which can cause Song Requester and WinAmp to crash. This condition may be due to a buffer overflow, which could lead to code execution.

AOL Instant Messenger Client HTML Injection Vulnerability

The AOL Instant Messenger client is prone to an issue which may allow maliciously crafted HTML to perform unauthorized actions (such as adding entries to the buddy list) on behalf of the user of a vulnerable client. This condition is due to how the client handles 'aim:' URIs. These actions will be taken without prompting or notifying the user. A web page loaded with the above code in the META REFRESH tag will automatically add a group called mindfliporg and add the users mindfliporg, mfliporb, mflipmax, mflips0nic, mflipzorcon to buddy list.

ICQ Sound Scheme File Remote Modification Vulnerability

ICQ is an instant messenger client for Microsoft Windows systems. ICQ includes support for sound schemes. ICQ sound scheme files are generally given the .scm extension. Reportedly, it is possible for a remote party to modify sound settings in ICQ by forcing a vulnerable user to access a blank .scm file. Allegedly, this may be done if the user views maliciously formatted HTML under some browsers. The HTML must reference a sound scheme file within an IFRAME tag.

IMHO Roxen Webmail Module Vulnerability

A vulnerability has been reported in the IMHO Roxen webmail module which may enable a malicious user of the webmail system to gain access to the account of another user. This issue is due to an error in configuration which may leak the REFERER for a session with the webmail system, which an attacker may use to access another webmail account. Login with an valid user/passwd, Logout and Goto URL : (((webmail_URL)))/(old_error,plain)/mail/error?error=1 This will cause the webserver to display a REFERER. This REFERER may be submitted to access another user's session.

Null Byte Injection

BadBlue is a P2P file sharing application distributed by Working Resources. It is available for Microsoft Windows operating systems. It has been discovered that a request passed to a BadBlue server containing a null byte at the end of a file name will return the contents of the file. This type of request can be applied to gain access to sensitive information, such as the BadBlue configuration file.

Recent Exploits: