header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer overflow vulnerability in cftp

A buffer overflow vulnerability has been reported in cftp. The vulnerability occurs when cftp is parsing 'Welcome' banner messages from remote FTP servers. When cftp receives an FTP banner exceeding a certain length, it will trigger the overflow condition. This could allow for execution of malicious code in the context of the FTP client.

Buffer Overflow Vulnerability in Apple QuickTime

A buffer overflow vulnerability exists in QuickTime PictureViewer.exe. The vulnerability occurs within TGA file images encoded data, specifically when encountering an invalid encoded width field. This can result in a heap-based buffer overflow. Remote attackers can exploit this vulnerability to execute arbitrary code or cause a denial of service (application crash) by using a crafted Targa image.

ezbounce Format String Vulnerability

ezbounce is affected by a format string vulnerability in the file ezbounce/commands.cpp. This vulnerability can be triggered when session support is enabled. To exploit this vulnerability, the attacker must have valid credentials. This vulnerability can be used by attackers with proxy access but no privileges on the underlying host.

TIBCO RendezVous local password extractor

This exploit allows an attacker to extract login credentials from TIBCO RendezVous version <=7.4.11. The passwords are stored in base64 format without encryption and the password file is accessible to everyone. This vulnerability affects the Windows environment.

lbreakout2 format string vulnerability

lbreakout2 is vulnerable to a format string issue in the login component. This vulnerability allows an attacker to execute arbitrary code on a vulnerable host. The exploit takes advantage of a format string bug in the initial login request. By sending a specially crafted packet containing shellcode and a format string buffer, an attacker can overwrite memory and execute arbitrary code.

Buffer Overflow in GNATS

GNATS is prone to a buffer overflow condition when parsing certain environment variables. An attacker can exploit this vulnerability by setting an overly long environment variable and invoking one of several GNATS utilities. This will trigger the overflow condition and will result in the corruption of sensitive memory. Successful exploitation may result in the execution of attacker-supplied code with elevated privileges.

Remote Code Execution in oops-1.4.6

This exploit allows an attacker to execute arbitrary code on a vulnerable system running oops-1.4.6. The exploit takes advantage of two offsets where shellcode can be placed, using two copies to ensure successful execution. The shellcode avoids large letters and certain characters, and includes a dup2(33,0) function to ensure that the attacker is the only one with shell access.

Recent Exploits: