header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Qpopper Memory Corruption Vulnerability

A memory corruption vulnerability has been discovered in Qpopper version 4.0.4 and earlier. The vulnerability occurs when calling the 'mdef' command and a malicious macro name is supplied. By filling a target buffer with a malicious macro name it may be possible to trigger a procedure that would cause sensitive memory to be corrupted. The problem occurs due to the lack of NULL termination by the Qvsnprintf() function. Successful exploitation of this issue may allow a remote attacker to execute arbitrary commands with the privileges of the Qpopper service.

Buffer Overrun Vulnerability in Opera Web Browser

A buffer overrun vulnerability has been discovered in the Opera web browser. The issue affects Opera versions 6 and 7 on the Microsoft Windows platform. Due to insufficient bounds checking when copying file names to a temporary buffer it may be possible for an attacker to corrupt memory. The problem occurs when downloading a file with a name of excessive length. Successful exploitation of this issue may allow an attacker to execute arbitrary commands within a browser that downloads the malicious file.

MySQL Privilege Escalation Vulnerability

An attacker can exploit this vulnerability by creating a DATADIR/my.cnf that includes the line 'user=root' under the '[mysqld]' option section. When the mysqld service is executed, it will run as the root user instead of the default user, which may allow an attacker to obtain elevated privileges on a compromised system.

Clearswift MailSweeper Malformed MIME Email Message Attachment Processing Vulnerability

Clearswift MailSweeper does not properly process certain malformed MIME email message attachments. If the attachment does not contain a MIME-Version field, MailSweeper does not recognize the attachment as being an executable type. MailSweeper allows such attachments through, even if it is set to filter executable type file attachments from incoming email messages.

Wordit Logbook Remote Command Execution Vulnerability

A remote command execution vulnerability has been discovered in the Wordit Logbook application. This issue occurs due to insufficient sanitization of externally supplied data to the 'logbook.pl' script. A remote attacker may exploit this condition to gain local, interactive access to the underlying host.

Eudora Buffer Overflow Vulnerability

Eudora may crash when handling messages which contain attachments with excessively long filenames. This condition reportedly occurs when messages with malformed attachment filenames are stored in the user's mailbox, which could result in a persistent denial of service to the mail client.

Recent Exploits: