header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Symantec Norton Internet Security 2003 Denial of Service Vulnerability

Symantec Norton Internet Security 2003 is reported to be prone to a denial of service condition. It is possible to trigger this condition by sending an excessive (approximately 65500 or more) number of ICMP packets to a host running Norton Internet Security. This may cause a denial of service and possible system instability. For this issue to be present remotely, the software must be configured to allow ICMP packets and the firewall must be enabled. Otherwise, it is possible to trigger this condition locally.

A file disclosure vulnerability has been reported for W-Agora

An attacker can construct a URL consisting of dot-dot-slash (../) character sequences to obtain access to files outside of the document root. It should be noted that only files accessible by the web server will be disclosed to the attacker.

A problem with phpPass may allow an attacker to launch a SQL injection attack.

phpPass is vulnerable to SQL injection attacks due to insufficient sanitization of user-supplied input. This allows an attacker to inject arbitrary SQL into the database used by a vulnerable site, allowing them to view pages that would normally be restricted. An example of an attack is the following: http://[target]/protectedpage.php?uid='%20OR%20''='&pwd='%20OR%20''='

Half-Life StatsMe Plug-in Format String Vulnerability

The Half-Life StatsMe plug-in is prone to an exploitable format string vulnerability. This issue may be exploited by an attacker who can authenticate with the rcon-password of the Half-Life server to execute arbitrary code in the context of the server process. Exploitation may be dependant on which other plug-ins are running on the Half-Life server. Successful exploitation will allow an attacker to gain local and possibly privileged access to the host running the server.

Half-Life StatsMe Plug-in Buffer Overflow Vulnerability

The Half-Life StatsMe plug-in is prone to an exploitable buffer overflow condition. This issue may be exploited by an attacker who can authenticate with the rcon-password of the Half-Life server to execute arbitrary code in the context of the server process. Exploitation may be dependant on which other plug-ins are running on the Half-Life server. Successful exploitation will allow an attacker to gain local and possibly privileged access to the host running the server.

FormMail-clone Cross-Site Scripting Vulnerability

FormMail-clone is allegedly prone to cross-site scripting attacks. The FormMail-clone script does not sufficiently sanitize HTML tags and script code. As a result, a remote attacker may construct a malicious link to the script which contains arbitrary script code. If this link is visited by a web user, the attacker-supplied script code may be interpreted by their browser in the context of the site hosting the software.

Recent Exploits: