header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

UMN gopherd[2.x.x/3.x.x]: remote “ftp gateway” buffer overflow

It has been reported that the FTP gateway component within the gopherd server is prone to a buffer overflow vulnerability. This vulnerability may be present due to a failure to perform bounds checking when processing long filenames returned from the FTP LIST command. This could permit code execution in the context of the software. When exploiting this bug, it is made moderately easy by gopherd. Because, the buffer that holds the string is 8192 bytes, and on the stack. Meaning the amount of NOPs used can be around ~7500.

Buffer Overflow Vulnerability in IglooFTP

A buffer overflow vulnerability has been reported in IglooFTP. The vulnerability occurs when IglooFTP is parsing 'Welcome' banner messages from remote FTP servers. When IglooFTP receives an FTP banner exceeding a certain length, it will trigger the overflow condition. This could allow for execution of malicious code in the context of the FTP client.

ChangshinSoft ezTrans Server Arbitrary File Disclosure Vulnerability

ChangshinSoft ezTrans Server is vulnerable to an arbitrary file disclosure vulnerability. This vulnerability is due to a lack of proper input validation in the download.php script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable server. This request will contain a maliciously crafted filename parameter that will allow the attacker to view arbitrary files on the server. This may result in the disclosure of potentially sensitive information.

Q-Shop ASP Shopping Cart Software Arbitrary File Upload Vulnerability

Zone-H has reported that the Q-Shop ASP shopping cart software contains a vulnerability that may allow remote attackers to upload arbitrary files. Once uploaded, the attacker may be able to have the script executed in the security context of the Web server. It is reported that Q-Shop provides an interface intended for administrators to upload files, however when this file is requested directly, no authentication is required.

Tower Toppler Local Privilege Escalation Vulnerability

A problem with the software may make elevation of privileges possible. It has been reported that a buffer overflow exists in Tower Toppler. A local user may be able to exploit this issue to execute code with the privileges of the toppler program. A Buffer overflow in HOME enviroment variable. Just your standard stack overflow... Should give a GID=20 on successful exploitation.

Recent Exploits: