header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

It has been reported that Tutos does not properly handle input to the file_select script

Tutos is vulnerable to a Remote Code Execution vulnerability due to improper input handling in the file_select script. An attacker can exploit this vulnerability by sending malicious code in the 'msg' parameter of the file_select script. This code will be executed in the browser of the user with the privileges of the vulnerable site.

MyServer HTTP Server Remote Denial of Service Vulnerability

MyServer HTTP server is prone to a remote denial of service attack due to a lack of sufficient bounds checking, performed on arguments that are supplied via malicious HTTP GET requests. A malicious HTTP GET request containing excessive data can trigger a segmentation fault in the server executable and the software will fail.

Heap Overflow Vulnerability in pr-edit Utility of GNATS

A heap overflow vulnerability has been reported for the pr-edit utility of GNATS. The vulnerability occurs due to insufficient checks performed on the arguments to the '-d' commandline option. Successful exploitation may result in the execution of attacker-supplied code with potentially elevated privileges.

Linux /proc information disclosure PoC

A potential information disclosure vulnerability has been reported for the Linux /proc filesystem, specifically when invoking setuid applications. As a result, an unprivileged user may be able to read the contents of a setuid application's environment data. This could potentially, although unlikely, result in the disclosure of sensitive information, such as restricted file path information.

Filemanager Arbitrary File Disclosure Vulnerability

A vulnerability has been reported for Filemanager that may result in the disclosure of arbitrary files. The vulnerability exists due to insufficient sanitization of user-supplied values for URI parameters. A malicious attacker can specify arbitrary absolute paths as the value of the URI parameter. This will result in the requested file being disclosed to the attacker.

pMachine Cross-Site Scripting Vulnerability

pMachine is vulnerable to a cross-site scripting attack. The vulnerability is present in the search module. The issue presents itself likely due to insufficient sanitization performed on user-supplied data that is passed as the query to the affected module. An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link. Attacker-supplied code passed as the keywords URI parameter may execute within the context of the site hosting the vulnerable software when the malicious link is visited.

A problem with Web Filter may allow attackers to obtain access to sensitive files

Web Filter is vulnerable to a directory traversal attack due to insufficient sanitization of '.../' sequences. This allows an attacker to access sensitive files on the server. For example, the above URL can be used to execute the 'dir' command on the Windows system.

Recent Exploits: