header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WorldClient Input Validation Vulnerability

WorldClient is a web interface packaged with MDaemon, an email server for Microsoft Windows. An input validation vulnerability exists in WorldClient that allows for an attacker to delete an arbitrary file on the webserver that it resides on. The vulnerability is due to a lack of input validation on the supplied filename for an attachment delete operation.

Cachefsd Remote Buffer Overflow

A remotely exploitable buffer overflow condition has been reported in cachefsd. The overflow occurs in the heap and is reportedly exploitable as valid malloc() chunk structures are overwritten. Successful attacks may result in remote attackers gaining root access on the affected system.

B2 News/Weblog Tool Variable Reference Vulnerability

B2 is a news/weblog tool written in php. A variable that is referenced in the PHP scripts does not actually exist. Thus, an attacker may be able to define the value of the variable. By creating a PHP script on the remote side and embedding commands in it, the attacker is able to reference the remote file. This could potentially allow the attacker to execute commands on the vulnerable system.

askSam Web Publisher Cross Site Scripting and Path Disclosure Vulnerabilities

askSam Web Publisher (versions 1 and 4) is reportedly vulnerable to cross site scripting vulnerability in the as_web.exe (or as_web4.exe) component. This is due to a failure to strip script and HTML when returning error messages that include user input. The same component can also disclose paths on the server when non-existant files are requested.

MyGuestbook Script Injection Vulnerability

MyGuestbook is freely available guestbook software. It does not adequately filter script code from various fields, which may enable an attacker to inject script code which will be executed in the web client of an arbitrary user who views the guestbook. Attackers may potentially exploit this issue to hijack web content or to steal cookie-based authentication credentials.

BEA Systems WebLogic Server DOS Device Denial of Service Vulnerability

It is possible to create a denial of Service condition by appending a null character to a request for a MS-DOS device name (such as AUX). Multiple malformed requests will cause the server to hang.

Performance Co-Pilot (PCP) Denial of Service Vulnerability

A vulnerability exists in some versions of the Performance Co-Pilot (PCP) daemon. It is possible to cause a denial of service condition by sending the daemon a large string of arbitrary data. An example of this exploit is using a Perl script to generate a large string of data and sending it to the PCP daemon via telnet.

Recent Exploits: