header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MS06-040 Remote Code Execution Proof of Concept

This is a proof-of-concept code for the MS06-040 vulnerability, which allows remote code execution. It is tested against Windows XP SP1 and Windows 2000 SP4. The affected systems include Microsoft Windows 2000 SP0-SP4, Microsoft Windows XP SP0-SP1, and Microsoft Windows NT 4.0.

Memory Exposure in Vignette

Vignette is prone to an issue which may expose the contents of memory to remote attackers. This condition is due to a flaw in how StoryServer calculates the size of certain characters in URI variables, which may cause data from adjacent memory to be returned to the remote attacker in the response.

Format String Vulnerability in Magic Winmail Server

A format string vulnerability has been reported for Magic Winmail Server when processing the USER POP3 command. An attacker may exploit this vulnerability by connecting to the vulnerable mail server and issuing the USER command with malicious format string specifiers. This may result in the corruption of sensitive memory.

Weak Password Encryption Algorithm in MySQL

MySQL has been reported to implement a weak password encryption algorithm. It has been reported that the MySQL function used to encrypt MySQL passwords makes just one pass over the password and employs a weak left shift based cipher. The hash may be cracked in little time using a bruteforce method. An attacker may use information recovered in this way to aid in further attacks launched against the underlying system.

Microsoft IIS User Enumeration Vulnerability

Microsoft IIS is prone to an issue where the existence of users may be revealed to remote attackers. The vulnerability exists when users attempt to authenticate against a vulnerable system. IIS will generate an error page if authentication fails. Different messages are generated depending on whether the user exists or not.

Invision Power Board <= 3.3.4 unserialize() PHP Code Execution

This exploit allows for PHP code execution in Invision Power Board versions up to 3.3.4. It bypasses the patch that sanitizes the unserialize function by using a specific payload. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system.

Recent Exploits: