header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IBM Forms Viewer Unicode Buffer Overflow

This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long fontname value. This module has been tested successfully on IBM Forms Viewer 4.0 on Windows XP SP3 and Windows 7 SP1.

Local Privilege Escalation in ISPmanager

The vulnerability allows a local attacker to gain elevated privileges on the affected computer by exploiting a flaw in ISPmanager. By executing a specific command, the attacker can access sensitive information and compromise the affected computer.

Acunetix Web Vulnerability Scanner Remote Denial of Service

The Acunetix Web Vulnerability Scanner 4.0 <= Build 20060717 is vulnerable to a remote denial of service attack. The vulnerability is triggered when a malformed packet with an invalid 'Content-Length' field is sent to the scanner. This causes the application to crash. The vulnerability has been fixed in later versions of the scanner.

Remote Buffer Overflow in Rigs of Rods

Rigs of Rods is prone to a remote buffer-overflow vulnerability due to the application's failure to properly check the bounds of user-supplied data before copying it into a buffer that is not sufficiently sized. An attacker can exploit this vulnerability to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.

SQL Injection in Click&BaneX

Click&BaneX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Cross-site Scripting Vulnerability in Citrix NetScaler

The application fails to properly sanitize user-supplied input, allowing an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can lead to the theft of cookie-based authentication credentials and enable other attacks.

Recent Exploits: