header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Raptor Firewall UDP-GSP (UDP-Proxy) Denial of Service Vulnerability

A problem with the handling of UDP packets by the Raptor Firewall has been discovered. When the firewall receives zero length UDP packets, the machine hosting the firewall becomes processor bound, with the firewall taking 100% of the CPU, making it possible for a remote user to crash the firewall, denying service to legitimate users of network resources.

TUX Kernel Panic

An error exists when the TUX daemon received an oversized Host: header as part of a HTTP request. The request will result in an assertation failure and eventually in a kernel panic. At this point a system reboot will be required to regain normal functionality. The exploit can be triggered by sending a crafted HTTP request with an oversized Host header using the following command: perl -e "print qq(GET / HTTP/1.0Accept: */*Host: ) . qq(A) x 6000 . qq(n)" |nc <ip address> <dest_port>

Windows GDI Kernel Mode Exception Vulnerability

A vulnerability exists in the Windows Graphics Device Interface (GDI) which causes the GDI to invoke a Kernel Mode Exception due to a memory access error. This action will result in a system stop error (bluescreen). A reboot of the system will allow normal system recovery. This condition may be due to an inability of the GDI API to handle requests with malformed or invalid arguments or flags.

iBill Password Management Vulnerability

A vulnerability exists in iBill's CGI password management script called ibillpm.pl. The default password is the client's MASTER_ACCOUNT name plus two lower case letters. The MASTER_ACCOUNT name can be determined by viewing the HTML source of the site's sign-up pages.

Microsoft Internet Explorer Spoofing Vulnerability

It is reported that Microsoft Internet Explorer may permit aspects of the Internet Explorer interface to be spoofed. This could facilitate numerous attacks against users of the browser, including spoofing of both graphical components of the underlying operating system and overlaying browser components. This misrepresentation may fool a user into taking dangerous actions. Users could then take further actions that compromise sensitive information based on this false sense of trust.

RDP Denial of Service Vulnerability in Windows 2000/NT Terminal Server

Due to a flaw in the implementation of RDP in Windows 2000/NT Terminal Server, it is possible for a remote user to cause a host to stop responding. Sending malformed RDP packets to a host could cause a denial of services, potentially impacting the Terminal service and other applications running on the affected host.

Denial-of-Service Vulnerability in Linux Kernel

A denial-of-service vulnerability exists in several versions of the Linux kernel. The problem occurs when a user with local access creates a long chain of symbolically linked files. When the kernel dereferences the symbolic links, the process scheduler is blocked, effecively locking the system until the dereferencing is complete.

Recent Exploits: