header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

phpMyAdmin Multiple Remote Vulnerabilities

phpMyAdmin is prone to multiple remote vulnerabilities that allow remote attackers to execute arbitrary commands and disclose files on a vulnerable computer. These vulnerabilities are caused by insufficient sanitization of user-supplied data.

GameSpy SDK CD-key Validation Functionality Buffer Overflow Vulnerability

The GameSpy SDK is prone to a buffer overflow vulnerability in its CD-key validation functionality. This vulnerability occurs due to a failure of the SDK to properly check the length of user-supplied network data before copying it to a fixed-sized memory buffer. Exploiting this vulnerability may allow attackers to execute arbitrary machine code within the context of the affected GameSpy developed game.

Remote vulnerabilities in GNU wget

The vulnerabilities in GNU wget allow attackers to perform directory traversal, arbitrary file overwriting, and execute malicious code by not properly sanitizing user-supplied input and validating file presence before writing to them. An attacker can exploit these issues to overwrite files within the current directory and potentially outside of it, leading to file corruption, denial of service, and further attacks against the affected computer. The vulnerabilities can be exploited by a malicious server.

Cross-Site Scripting Vulnerability in PhpGedView

PhpGedView is affected by a cross-site scripting vulnerability due to a failure to properly sanitize user-supplied URI input. A remote attacker can create a malicious URI link that includes hostile HTML and script code. If the link is followed, the hostile code may be rendered in the victim user's web browser, potentially allowing for theft of authentication credentials or other attacks.

Kerio Personal Firewall Denial of Service Vulnerability

The Kerio Personal Firewall (KPF) driver does not properly sanitize API parameters, leading to a denial of service vulnerability. When certain parameter data is handled by the KPF API hook, it triggers an exception and causes a crash in the Windows kernel, resulting in a system-wide denial of service. An attacker can exploit this vulnerability to disrupt the services and deny access to legitimate users.

Remote URI Obfuscation Vulnerability in Internet Explorer

A remote URI obfuscation vulnerability has been found in Internet Explorer's search pane functionality. This issue is due to a failure of the application to present the URI address of HTML and script code loaded into the search pane. An attacker can exploit this vulnerability to display misleading information in the address bar of the browser, making it seem like the web page is from a trusted location. This can be used to facilitate phishing attacks and other types of attacks.

MD5 Hash Collision Weakness

The MD5 algorithm is prone to a hash collision weakness, allowing attackers to create multiple input sources that result in the same output fingerprint. This can be exploited to substitute a malicious file for an innocent one, potentially leading to the execution of malicious code or breaking non-repudiation properties of messages.

Cross-Site Scripting Vulnerability in Blog Torrent

A cross-site scripting vulnerability exists in Blog Torrent due to improper sanitization of user-supplied URI input. An attacker can create a malicious URI link containing hostile HTML and script code, which, if followed by a victim user, can result in the execution of the malicious code in the user's web browser. This can lead to theft of authentication credentials and other attacks.

Recent Exploits: