header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Kerio Personal Firewall Denial of Service Vulnerability

The Kerio Personal Firewall (KPF) driver does not properly sanitize API parameters, leading to a denial of service vulnerability. When certain parameter data is handled by the KPF API hook, it triggers an exception and causes a crash in the Windows kernel, resulting in a system-wide denial of service. An attacker can exploit this vulnerability to disrupt the services and deny access to legitimate users.

Remote URI Obfuscation Vulnerability in Internet Explorer

A remote URI obfuscation vulnerability has been found in Internet Explorer's search pane functionality. This issue is due to a failure of the application to present the URI address of HTML and script code loaded into the search pane. An attacker can exploit this vulnerability to display misleading information in the address bar of the browser, making it seem like the web page is from a trusted location. This can be used to facilitate phishing attacks and other types of attacks.

MD5 Hash Collision Weakness

The MD5 algorithm is prone to a hash collision weakness, allowing attackers to create multiple input sources that result in the same output fingerprint. This can be exploited to substitute a malicious file for an innocent one, potentially leading to the execution of malicious code or breaking non-repudiation properties of messages.

Cross-Site Scripting Vulnerability in Blog Torrent

A cross-site scripting vulnerability exists in Blog Torrent due to improper sanitization of user-supplied URI input. An attacker can create a malicious URI link containing hostile HTML and script code, which, if followed by a victim user, can result in the execution of the malicious code in the user's web browser. This can lead to theft of authentication credentials and other attacks.

Arbitrary FTP Server Command Execution in KDE FTP kioslave-based Applications

KDE FTP kioslave-based applications such as Konqueror are reported prone to an arbitrary FTP server command execution vulnerability. This issue allows attackers to embed arbitrary FTP server commands in malicious URIs, leading to the execution of these commands on remote servers. Attackers can exploit this vulnerability to download malicious files to the victim's computer or send email to arbitrary addresses without user interaction.

Arbitrary FTP Server Command Execution in Microsoft Internet Explorer

Microsoft Internet Explorer is prone to an arbitrary FTP server command-execution vulnerability. Attackers can embed arbitrary FTP server commands in malicious URIs, which, upon following, will connect the victim user's browser to the attacker-specified FTP server and send the malicious commands. This can result in the download of malicious files to the victim's computer without their knowledge. The vulnerability can also be leveraged to send email to arbitrary addresses without user interaction.

Recent Exploits: