header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

KeyFocus KF Web Server Directory Traversal Vulnerability

KeyFocus KF Web Server is vulnerable to a directory traversal attack due to its inability to properly handle file names containing consecutive dot characters. An attacker can exploit this vulnerability to break out of the web root and retrieve any file readable by the web server. Only files of recognized MIME types can be retrieved.

phpBB Advanced Quick Reply Hack

It is possible for remote attackers to influence the include path for 'extension.inc' in the 'quick_reply.php' script. As a result, an attacker may cause an arbitrary PHP script to be included from an attacker-supplied source, which may result in execution of commands with the privileges of the webserver.

LibHTTPD Remote Buffer Overflow

LibHTTPD is vulnerable to a buffer overflow condition. By passing a POST request of excessive length, it is possible to overrun a static buffer. This may result in sensitive locations in memory being overwritten by attacker-supplied values. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code with super user privileges.

W3Mail File Disclosure Vulnerability

Versions of W3Mail 1.0.6 and greater are susceptible to a file disclosure vulnerability. To view attachments, the script "viewAttachment.cgi" accepts the parameter "file". The value of this parameter is passed to the open() function as the filename argument without being sanitized. Attackers may cause any file on the filesystem to open by specifying its relative path using directory traversal characters.

Traceroute-nanog 6.0 -> 6.1.1 exploit

A vulnerability has been discovered in Traceroute-nanog. It has been reported that Traceroute-nanog contains a buffer overflow condition. The overflow occurs in the 'get_origin()' function in the 'traceroute.c' file. Due to insufficient bounds checking performed by the whois parser, it may be possible to cause 'get_origin()' to corrupt memory on the system stack. This vulnerability can be exploited by an attacker to gain root privileges on a target host. My technique was to write my own malicious server that would inject a carefully crafted response to traceroute's query, triggering the overflow and letting me obtain local r00t access.

Light httpd Remote Exploit

Light httpd is prone to a remotely exploitable buffer overflow condition. This overflow can be triggered by sending the server an excessively long GET request. As Light httpd drops user privileges when running, exploitation of this issue may result in the execution of arbitrary attacker-supplied commands with the privileges of the 'nobody' user.

Recent Exploits: