header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unauthorized Access Vulnerability in Guestbook

Guestbook is vulnerable to an unauthorized access vulnerability due to insufficient permissions on the 'admin.php' script file. By accessing the URL http://hostname/guestbook/admin.php, an attacker can gain access to the administrative functions of the application.

Sendmail 8.11.6 Remote Exploit

Sendmail 8.11.6 is vulnerable to a buffer overflow in the 'prescan()' procedure, which is used for processing email addresses in SMTP headers. This condition has been confirmed to be exploitable by remote attackers to execute instructions on target systems. This vulnerability stems from a logic error in the conversion of a char to an integer value. The exploit takes advantage of the vulnerable prescan() function that allows the user to input 0xff in order to skip the length check of the buffer. The goal is to overwrite the 2 lsb of the saved frame pointer and make it point to an area we control. The exploit works against sendmail 8.11.6 on Linux.

D-Link DI-614+ Wireless Router IP Fragmentation Denial of Service Vulnerability

It has been reported that the implementation of the Internet Protocol (IP) in the firmware of the D-Link DI-614+ wireless router is vulnerable to a remotely exploitable denial of service condition. The vulnerability is related to the reassembly of fragmented IP packets and can be triggered by transmission of fragments with malicious size parameters to an affected device. There is existing source code that exploits similar, older vulnerabilities that can be used to successfully exploit this vulnerability. When exploited, the device will reboot instantly. This will result in a denial of service until the device has restarted.

Multiple Path Disclosure Vulnerabilities in PHP-Nuke

Multiple path disclosure vulnerabilities have been reported in various PHP scripts used by PHP-Nuke. The issue occurs when an invalid URI parameter is passed to certain scripts. The affected scripts do not provide sufficient error handling for this circumstance and as such, may display an error page containing sensitive information path information.

MyGuestBK Information Server ‘Add Entry’ page Vulnerability

It has been reported that MyGuestBK does not sufficiently filter user-supplied URI parameters on the MyGuestBK Information Server 'Add Entry' page. It may be possible for a remote attacker to create a malicious link containing script code that will be executed in the browser of a legitimate user. This may allow for theft of cookie-based authentication credentials and other attacks.

Buffer Overflow in PHP openlog() Function

A buffer overflow has been reported in the PHP openlog() function. By passing an argument of excessive size to the function, it may be possible for an attacker to overwrite memory, resulting in a denial of service. It is also possible for an attacker to execute arbitrary code in the PHP interpreter.

Monkey HTTP Daemon Remote Buffer Overflow

Monkey HTTP Daemon is prone to a boundary condition error. This condition occurs when the server attempts to handle excessive HTTP POST data. Exploitation could allow a remote attacker to corrupt sensitive regions of memory with attacker-supplied values, resulting in code execution. Exploitation attempts may also result in a denial of service.

Information Disclosure Vulnerability in Sambar Server

An information disclosure vulnerability has been reported for Sambar Server. The vulnerability exists in some files existing in Sambar Server's cgi-bin directory. An attacker can exploit this vulnerability by making a request for these files. This will result in Sambar Server returning potentially sensitive information. An attacker can use the information obtained in this manner to launch further attacks against a vulnerable host.

Recent Exploits: