header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

sdfingerd Local Privilege Escalation Vulnerability

sdfingerd has been reported prone to a local privilege escalation vulnerability. The issue presents itself because the sdfingerd daemon fails to sufficiently drop group privileges before executing commands that are contained in a users .plan file. An attacker can exploit this vulnerability to gain root privileges.

Kerio Mailserver Cross Site Scripting Vulnerability

Kerio Mailserver is vulnerable to a cross site-scripting attack. The vulnerability is present in the do_map module of the Kerio Mailserver web mail component. An attacker may exploit this vulnerability by enticing a victim user to follow a malicious link containing malicious HTML code.

Multiple Buffer Overrun Vulnerabilities in Kerio MailServer

Multiple buffer overrun vulnerabilities have been discovered in Kerio MailServer, which affect the webmail component. The problem occurs when handling usernames of excessive length and likely occurs due to insufficient bounds checking. Successful exploitation of this vulnerability could potentially result in the execution of arbitrary code, with the privileges of the Kerio MailServer process.

MidHosting FTP Daemon Denial of Service

It has been reported that MidHosting FTP Daemon does not properly implement shared memory when the m flag (-m) is enabled. Because of this, an attacker could corrupt process memory, causing the service to crash. The exploit code creates a shared memory segment of 16384 bytes and fills it with 'A' characters.

WebForums Server Directory Traversal Vulnerability

It has been reported that WebForums Server does not properly handle some types of requests. Because of this, attackers may be able to gain access to files on the host server with the privileges of the web server process. Examples of directory traversal proof of concepts had been provided by R00tCr4ck <root cyberspy org>.

Multiple vulnerabilities in Squirrelmail

Multiple vulnerabilities have been reported for Squirrelmail which could allow for information disclosure, data corruption, and privilege escalation. The problems appear to occur due to insufficient sanitization of URI parameters submitted within HTTP requests. It has been discovered that all information disclosure and data corruption issues are in fact not vulnerabilities. The issue lies in the default IMAP configuration, allowing a remote authenticated user to specify their local mailbox file. This behaviour is clearly specified in the IMAP FAQ. All actions carried out by an authenticated user are done with their own local system privileges, effectively having no affect on the system. This information has been confirmed by the vendor. It should also be noted that the vendor has announced that the privilege elevation issue is indeed legitimate.

Buffer Overrun Vulnerability in CesarFTP

A buffer overrun vulnerability has been reported for CesarFTP. The problem is said to occur when multiple 'USER' commands are processed within a single session. When the issue is triggered, it may be possible to overwrite sensitive locations in memory. Although unconfirmed, it may be possible to exploit this issue to execute arbitrary code on a target system.

Recent Exploits: