header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Quake II Server Vulnerability

A vulnerability has been reported in some versions of the Quake II server. While variable expansion is normally performed on the client side, a modified client may pass unexpanded variables such as $rcon_password to the server. The server will expand these variables within it's local context, potentially leaking sensitive information to the remote attacker.

XMB Forum 1.6 Magic Lantern Logging Bypass and Log File Retrieval Vulnerability

XMB Forum 1.6 Magic Lantern allows remote users to conduct activities in the forum while bypassing normal logging functions. This is accomplished by submitting an arbitrary string as the 'analized' variable to index.php. Log information is written only if this variable is empty, so submitting a string to it bypassing the logging. In addition, log files (index_log.log and cplogfile.log) may be written with improper permissions allowing users to retrieve them with a browser.

XMB Forum 1.6 Magic Lantern Cross-Site Scripting Vulnerabilities

XMB Forum 1.6 Magic Lantern is vulnerable to a number of cross-site scripting issues because of improper filtering of user input. The first involves 'member.php'; submitting script to the variable 'member' in the context of 'action=viewpro' (profile viewing) will cause that script to be returned as an error message. The second involves the 'MSN' information field of a user profile; a registered user can submit script to this field without it being filtered. The third issue can be exploited by submitting a '<script>' tag encoded as '%253Cscript%253E' (note that the percent sign is encoded as '%25', and '3C' and '3E' are the '<' and '>' brackets) to the username variable in the context of 'action=reg' to 'member.php'.

SGDynamo Script Code Injection Vulnerability

SGDynamo is a web application engine for Microsoft Windows operating systems. Script code is not filtered from URL parameters that are used as output by the SGDynamo program. This may enable an attacker to inject script code into a malicious link to the program. The script code will be executed in the browser of a user who visits the link, in the context of the site running the program. This may enable the attacker to steal cookie-based authentication credentials from legitimate users.

InJoin Directory URL Parameter Script Injection Vulnerability

InJoin Directory is provided for Microsoft Windows operating systems and Unix variants. HTML code is not filtered from URL parameters that are used as output in the web-based administrative interface. This enables an attacker to inject malicious script code into a link to the administrative interface. When this link is visited by an authenticated administrative user, the attacker's script code will be executed in the browser of that user, in the security context of the site running the interface. Successful exploitation may allow the attacker to steal cookie-based authentication credentials from the administrative user.

Wu-imapd Buffer Overflow Vulnerability

Wu-imapd is vulnerable to a buffer overflow condition. This has been reported to occur when a valid user requests partial mailbox attributes. Exploitation may result in the execution of arbitrary code as the server process. An attacker may also be able to crash the server, resulting in a denial of service condition.

Cisco ATA-186 Configuration Disclosure

A vulnerability exists in the Cisco ATA-186 Analog Telephone Adapter which allows an attacker to gain access to sensitive configuration information, including the password to the administrative web interface. This is achieved by sending an HTTP request consisting of a single character to the device.

Buffer Overflow in MDaemon

It may be possible for a remote user to take advantage of a buffer overflow in the MDaemon software package. The WorldClient.cgi program packaged with MDaemon does not properly check bounds on user-supplied data. During the process of creating a folder with a long name, it is possible to exploit a buffer overflow in the CGI that could result in the overwriting of process memory, and execution of attacker-supplied instructions.

Recent Exploits: