header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Yak! Chat Client FTP Server Remote Directory Traversal Vulnerability

The Yak! Chat Client FTP server is prone to a remote directory traversal vulnerability. The issue occurs due to insufficient sanitization of user-supplied data. An attacker can exploit this vulnerability to compromise a computer by placing malicious files on the system and executing them through other means.

Cross-Site Scripting Vulnerability in Pinnacle Systems ShowCenter

Pinnacle Systems ShowCenter is affected by a cross-site scripting vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied URI input. This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user.

3Com 3CRADSL72 Information Disclosure and Authentication Bypass Vulnerabilities

The vulnerabilities in 3Com 3CRADSL72 allow remote attackers to disclose sensitive information and bypass authentication. This can lead to the disclosure of router name, primary and secondary DNS servers, default gateway, and even gaining administrative access to the router. These vulnerabilities can be exploited to launch further attacks against the device and other users on the vulnerable network.

Multiple input validation vulnerabilities in FuseTalk Forum

The first issue is due to insufficient sanitization of user-supplied data, which allows an attacker to construct a malicious link containing HTML or script code. The second issue occurs when malicious code is sent to the 'tombstone.cfm' script through a URI parameter.

Denial of Service Vulnerability in IBM DB2

A denial of service vulnerability has been reported in IBM DB2. This vulnerability is reported to only exist when DB2 is installed on Microsoft Windows operating systems. This issue is due to a failure of the application to properly ensure that only authorized users can signal the DB2 UDB instance to shutdown. This is due to a Windows permissions issue related to shared memory sections, culminating in various denial of service attacks. This vulnerability allows attackers with local access to shutdown the DB2 UDB instance. This will result in the denial of database service to legitimate users.

Information Disclosure Vulnerability in IBM DB2

An information disclosure vulnerability has been reported in IBM DB2. This vulnerability only exists when DB2 is installed on Microsoft Windows operating systems. This is due to a Windows permissions issue related to shared memory sections, culminating in authorized access to sensitive information. This vulnerability allows local users to inappropriately connect to DB2 IPC resources, and to also read files that may contain potentially sensitive information. This may aid them in further attacks.

Cross-Site Scripting Vulnerability in Campus Pipeline

The Campus Pipeline application fails to properly sanitize user-supplied URI input, allowing a remote attacker to create a malicious URI link that includes hostile HTML and script code. When a victim user follows this link, the hostile code may be executed in the security context of the affected web site, potentially leading to theft of cookie-based authentication credentials or other attacks.

Recent Exploits: