header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Rediff Bol Downloader ActiveX Allows Downloading and Spawning Arbitary Files

Rediff Bol Downloader ActiveX control allows any webpage to download and spawn file. These file can be of any type. No filtering is done. IE Displays an alert, if the code points to a executable file on the internet. But execution of local files displays no alert.

FormBankServer Remote Buffer Overflow

FormBankServer is prone to a remote buffer overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application. This issue affects FormBankServer version 1.0.0.0 and prior.

Winzip FileView ActiveX Control Buffer Overflow

A buffer overflow vulnerability exists in the FileView ActiveX control included with Winzip 10.0. The vulnerability is caused due to a boundary error when handling overly long strings passed to the CreateNewFolderFromName() method. This can be exploited to execute arbitrary code by tricking a user into visiting a malicious web page.

P-News (user.dat)Remote Password Disclosure Vulnerability

P-News versions 1.17 and 1.16 are vulnerable to a remote password disclosure vulnerability. An attacker can access the user.dat file located at http:/[target]/[path]/db/user.dat to view the admin name and hash. The password can be cracked with any md5 encrypt or injected into a cookie editor such as FireFox or Opera.

Click N’ Print Coupons <= V2005.01 (key) Remote SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL code into the vulnerable application. The exploit is triggered when the application uses user-supplied input without proper validation. This can allow an attacker to gain access to sensitive information such as usernames and passwords stored in the database.

Recent Exploits: