header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

File Corruption Vulnerability in Opera

When a user is presented with a file dialog in Opera, a temporary file is created. It is possible for an attacker to specify a relative path to another file on the system using directory traversal sequences. If the user has write permissions to the specified file, it can be corrupted. This vulnerability could be exploited to delete sensitive files on the system. It is unknown if it could be used to trojan files.

mercur-login.pl

This is a Perl script that exploits a vulnerability in the Sami FTP server. It is based on a remote exploit by Critical Security. The script allows an attacker to execute arbitrary code on a vulnerable system. The script has been tested on Windows 2000 SP4 Italian and English versions and Windows XP Pro SP2 Italian and English versions. The exploit uses a specific return address depending on the target system.

Cyrus IMSPD Remote Root Exploit

A remote attacker can gain unauthorized access to a system using the vulnerable software by exploiting a buffer overflow vulnerability in the 'abook_dbname' function. By sending a long argument with the FETCHADDRESS command, the attacker can cause a buffer overflow and execute arbitrary commands.

Recent Exploits: