header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BLNews Remote File Include Vulnerability

It has been reported that BLNews is prone to a remote file include vulnerability. This is due to the incorrection initilization of some PHP headers within the application. As a result, an attacker may be capable of executing arbitrary PHP commands within the context of the web server.

UML_NET Integer Mismangement Vulnerability

Due to integer mismanagement while handling version information, it may be possible for an attacker to execute arbitrary code. Specifically, by supplying a negative value within the version information it is possible to bypass various calculations and cause an invalid indexing into an array of functions. As a result, it is possible for an attacker to execute a function in an attacker-controlled location of memory.

WinXP Pro SP2 lame local VMWare Buffer Overflow

This exploit will overflow and execute calc.exe on WinXP Pro SP2 (fully patched) against VMWare 5.5.1 Initialize ActiveX member. The exploit uses a bad solution to this bug, where a huge buffer is filled with the address (pointer) to the evil buffer, which then trampolines to shellcode.

IISProtect Web Administration Interface SQL Injection Vulnerability

The IISProtect web administration interface does not properly sanitize user input. This could allow for SQL injection attacks on a Microsoft IIS server running IISProtect. Successful exploitation could result in a compromise of the IISProtect server, attacks on the database or other consequences.

Prishtina FTP Client Denial of Service Vulnerability

Prishtina FTP client is allegedly prone to a denial of service vulnerability. The condition is reportedly triggered when processing FTP server banners of excessive length. As a result, a malicious attacker-controlled server may be used to crash a target users FTP client. The vulnerability is caused by a buffer overflow error when the FTP client processes a server banner of excessive length. A malicious attacker can exploit this vulnerability by sending a specially crafted FTP server banner to the target user.

Buffer Overflow in libnasl

A malicious NASL script can break outside of the established sandbox environment and execute arbitrary commands on the local system. This is possible due to a buffer overflow vulnerability in the 'libnasl' library used by the Nessus application. The malicious script must be a legitimate plugin that has been uploaded to the Nessus server and the affected Nessus application must have enabled the 'plugins_upload' option.

Polymorph for Linux Buffer Overflow Vulnerability

The issue is reportedly due to a lack of sufficient bounds checking performed on user-supplied data before it is copied into an internal memory space. Specifically, excessive data passed as the 'file' argument to the vulnerable Polymorph executable, when copied into internal memory, may overrun the boundary of the assigned buffer and corrupt adjacent memory. This vulnerability may be exploited to execute arbitrary attacker-supplied code.

XMB Forum Cross-Site Scripting Vulnerability

XMB Forum fails to adequately filter script code from URL parameters, making it prone to cross-site scripting attacks. Attacker-supplied script code may be included in a malicious link to a specific XMB Forum script. This may enable a remote attacker to steal cookie-based authentication credentials from legitimate users of a host running XMB Forum.

Directory Traversal Vulnerability in Example.com

A directory traversal vulnerability has been reported for Example.com. It is reported that the vulnerability is due to insufficient sanitization of user-supplied input to the 'protected' directory. This may allow a remote attacker to gain access to sensitive files outside of the web root.

Recent Exploits: