header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SAP Web Application Server Input-Validation Vulnerability

The SAP Web Application Server is prone to an input-validation vulnerability that results in HTTP response-splitting attacks. This issue is due to a failure in the application to properly sanitize user-supplied input. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

HTML Injection Vulnerability in MonoChat

The MonoChat application is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content. This allows an attacker to inject malicious HTML and script code, which would be executed in the context of the affected website. This could potentially lead to the theft of cookie-based authentication credentials or control over how the site is rendered to the user. Other attacks may also be possible.

Chart Mod Multiple Input-Validation Vulnerabilities

The Chart Mod application is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection vulnerabilities. These vulnerabilities occur due to a failure in the application to properly sanitize user-supplied input. An attacker can exploit these vulnerabilities to compromise the application, access or modify data, steal authentication credentials, or exploit vulnerabilities in the underlying database implementation.

Buffer Overflow Vulnerability in GNU ‘binutils’

The GNU 'binutils' is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Remote attackers may crash the 'strings' utility, potentially making analysis of malicious binaries more difficult. Attackers may also execute arbitrary machine code in the context of applications that use the affected library.

Cartweaver ColdFusion SQL Injection Vulnerability

Cartweaver ColdFusion is prone to SQL-injection vulnerabilities. These issues are due to the application's failure to properly sanitize user-supplied input before using it in SQL queries. Successful exploits could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Path-Conversion Weakness in Microsoft Windows

The vulnerability allows attackers to bypass security applications by exploiting the multiple differing algorithms used by the operating system to resolve file paths. Attackers can use this weakness to bypass security software such as antivirus and antispyware products, and potentially execute other attacks.

WinZip <= 10.0.7245 FileView ActiveX buffer overflow exploit

A vulnerability has been identified within Winzip that allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. The flaw exists within 'FileView' ActiveX control which contains stack-based overflow conditions. This exploit generates a malicious HTML page and contains shellcode embedded within an image file. Due to the random nature of the heap, this exploit uses hard-coded location of the image bytes within the heap and as such is unreliable in exploitation of this bug, but has approximately 1 in 6 hit ratio within the tested environment.

Recent Exploits: