header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Lucent Access Point Series Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in the Lucent Access Point series of routers due to insufficient bounds checking of user-supplied input. An attacker can send a HTTP request consisting of approximately 4000 characters of data to cause the device to reboot, resulting in an interruption of service for legitimate users of the device.

Microsoft SQL Server 2000 sp_MScopyscript Stored Procedure Arbitrary Command Execution

The Microsoft SQL Server 2000 sp_MScopyscript stored procedure does not sufficiently validate input before passing it to the xp_cmdshell extended stored procedure. An attacker with the ability to execute a query or pass malicious input to a query may be able to execute operating system commands via xp_cmdshell with the privileges of the SQL Server. The sp_MScopyscript stored procedure may be executed by the 'public' role by default, so it is possible that a database user with privileges may potentially exploit this issue. The Microsoft SQL Server must be configured to function as a distributor for this issue to be exploited. Certain other conditions must be satisfied for exploitation to succeed, such as the SQL Server running in the context of a domain user. By supplying a malformed @scriptfile parameter an attacker can run arbitrary commands.

Microsoft SQL Server 2000 DBCC Buffer Overflow

A vulnerability exists in Microsoft SQL Server 2000 due to a buffer overflow in the Database Consistency Checkers (DBCC) utilities. An attacker can exploit this vulnerability by sending a specially crafted request to the server, which could allow the attacker to execute arbitrary code with the privilege level of the SQL Server service account.

CacheOS Cross-Site Scripting Vulnerability

CacheOS is vulnerable to Cross-Site Scripting (XSS) attacks due to insufficient sanitization of user-supplied data. An attacker can construct a link for a nonexistant subdomain of a valid site, and include malicious JavaScript. If followed, the supplied script code will execute within the context of the requested domain.

Authentication Bypass Vulnerability in Cobalt Qube

A vulnerability has been reported for Cobalt Qube that may allow an attacker to bypass the authentication mechanism and obtain administrative privileges. The authentication mechanism fails to properly validate the input supplied in the client cookie. Thus it is possible for an attacker to refer to a file on the filesystem as that containing the session key. This vulnerability may be exploited by remote attackers to obtain administrative privileges on the device. An attacker can use the curl command to delete the password file and obtain administrative credentials on the vulnerable system.

Recent Exploits: