header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PlanetWeb Software perl exploit

PlanetWeb is vulnerable to a buffer overflow condition when handling GET requests of excessive length. Upon receiving a GET request containing a 1024 byte or greater URL, an exploitable buffer overflow occurs, which may result in the remote execution of arbitrary code within the context of the web server process.

Savant Webserver Input Validation Bug

Savant Webserver is vulnerable to an input validation bug, that could allow malicious users access to password protected folders. It should be noted that versions below 3.1 may also be vulnerable to this issue. An attacker can use the following requests to exploit this vulnerability: GET /password_folder / HTTP/1.0, http://host/password_folder%, http://host/password_folder%20

BRU Symbolic Link Attack

BRU is a backup and restore utility distributed by The Tolis Group. This vulnerability affects the utility on the Linux platform. xbru does not properly check for the existence of temporary files prior to execution. Because of this, it is possible for a local user to create symbolic links to other files, which will be overwritten by the BRU user. As BRU is typically run by the root user, this could result in the overwriting of root-owned files.

SSR8000 SmartSwitch Unpredictable Behavior

The SSR8000 SmartSwitch distributed and maintained by Enterasys has been discovered to react unpredictably when portscanned. When these switches are scanned using specific types of TCP traffic, and scanned on certain ports, the switch becomes unstable and can be crashed consistently.

Netris Remotely Exploitable Memory Corruption Issue

Netris is prone to a remotely exploitable memory corruption issue. An attacker may exploit this to execute arbitrary code with the privileges of the user invoking the vulnerable application. When the MyEventType() function is done, the contents of the buffer can continue on past netBuf[64], into other data segments. However, the segment right after netBuf[64](netBufSize[4]) will be changed to 0x00000000, after the overflow has taken place. So, instead of using 64 byte shellcode, we will skip the first 68 bytes(filler). This will look like so: memory: [netBuf(64)][netBufSize(4)]...[other data segments] exploit: [68 filler bytes][nops][shellcode][return address]

phpGB PHP Code Injection Vulnerability

phpGB is subject to a PHP code injection vulnerability. After bypassing authentication it is possible to inject code into the guestbook configuration file (config.php) by supplying malicious parameters for the savesettings.php script. The configuration file is referenced in most of the other guestbook scripts, so each time one of the scripts is accessed the attacker-supplied PHP code will be executed.

Trillian Instant Messaging Client Weak Encryption Vulnerability

The Trillian instant messaging client uses weak encryption to store saved authentication credentials for instant messaging services. The credentials are encrypted by using XOR with a static key that is used with every installation of the software. Local attackers may potentially exploit this weakness to gain access to another user's instant messaging credentials.

Recent Exploits: