header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

hsftp Remote Print Format String Vulnerability

hsftp has been found to be prone to a remote print format string vulnerability. This issue is due to the application improper use of a format printing function. Ultimately this vulnerability could allow for execution of arbitrary code on the system implementing the affected software, which would occur in the security context of the server process.

Privilege Escalation in Dell TrueMobile 1300 Wireless System Tray Applet

A privilege escalation vulnerability exists in the Dell TrueMobile 1300 Wireless System Tray Applet. The software starts with SYSTEM privileges to enable access to the wireless hardware but fails to drop them. This allows a local attacker to manipulate the GUI of the application to spawn arbitrary processes with the privileges of the affected process.

Multiple Buffer Overflow Vulnerabilities in LBreakout2

Multiple buffer overflow vulnerabilities exist in the environment variable handling of LBreakout2. The issue is due to an insufficient boundary checking of certain environment variables used by the affected application. A malicious user may exploit this condition to potentially corrupt sensitive process memory in the affected process and ultimately execute arbitrary code with the privileges of the game process.

IBM Lotus QuickR qp2 ActiveX Buffer Overflow

This module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.

Remote Denial of Service Vulnerability in SmallFTPD

SmallFTPD is prone to a remote denial of service vulnerability. This issue is due to the application failing to properly validate user input. Successful exploitation of this issue may cause the affected server to crash, denying service to legitimate users. It has been conjectured that this issue may be due to a boundary management problem that may lead to arbitrary code execution, however this has yet to be verified.

Vulnerability in Sami HTTP server

The vulnerability occurs in Sami HTTP server due to insufficient bounds checking when handling GET requests. An attacker can exploit this vulnerability to corrupt sensitive data, such as a return address, and gain control over the program's execution flow. This can lead to the execution of arbitrary code and potential denial of service.

Multiple Vulnerabilities in EarlyImpact ProductCart

The vulnerabilities in EarlyImpact ProductCart allow for SQL injection, cross-site scripting, and cryptographic weaknesses. These issues could lead to the exposure of sensitive data, execution of hostile script code, and HTML. The exploitation of these vulnerabilities could result in a full compromise of the software.

Limbo com_contact Remote Commands Execution Exploit

The Limbo <= 1.0.4.2L 'com_contact' component allows remote attackers to execute arbitrary commands via the contact_attach parameter in a POST request to index.php. This vulnerability can be exploited by uploading a file with a specially crafted filename to the server, allowing the attacker to execute arbitrary commands.

Recent Exploits: