header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

uDirectory Remote Command Execution Vulnerability

An input validation error exists in uDirectory that may allow remote users to execute arbitrary commands on a host running the software. A malicious user can send a specially crafted request to the vulnerable server, which will allow the attacker to execute arbitrary commands on the server.

DoS for isapi idq.dll unchecked buffer

Windows Index Server and Windows Indexing Service contain an unchecked buffer in the 'idq.dll' ISAPI extension. A maliciously crafted request could allow arbitrary code to run on the host in the Local System context. This vulnerability is currently being exploited by the 'Code Red' worm.

GazTek HTTP Daemon v1.4 (ghttpd) Linux x86 remote exploit

A buffer overflow is known to exist in ghttp which will allow arbitrary code to be executed with the privileges of the webserver. Proof-of-concept code has demonstrated that this vulnerability can be exploited by remote attackers.

BestCrypt Local Privilege Escalation Vulnerability

A problem with BestCrypt makes it possible for a local user to gain elevated privileges. Due to insufficient checking of bounds by the program bctool when unmounting an encrypted file system, it's possible to overflow a buffer within the program, overwriting variables on the stack. This could lead to execution of code as root.

Buffer Overflow Vulnerability in ‘man’ System Manual Pager Program

A buffer overflow vulnerability exists in the implementation of the 'man' system manual pager program commonly included with Linux distributions. The vulnerability exists due to the way the program handles manual page files beginning with a '.so' statement. Under certain circumstances, the code responsible for processing this data may be allow the length of the filename from a '.so' statement to be expanded, eventually causing a boundary condition error. As a result, it may be possible for local users to execute arbitrary code with group 'man' privileges.

Screaming Media SiteWare Editor Desktop Directory Traversal Vulnerability

SiteWare Editor Desktop is prone to directory traversal attacks which can lead to disclosure of arbitrary webserver-readable files on the vulnerable host. This is due to the fact that the software does not filter '../' character sequences from HTTP Requests.

LPRng Insecure tmp file privilege elevation vulnerability

When the LPRng daemon is initialized, it fails to drop its supplementary groups. As a result, the daemon and any child processes it spawns will maintain the supplementary groups inherited from the process that started LPRng. Processes or routines which are meant to be run with lowered privileges will run with these supplementary group privileges. Vulnerable sections of program code are often run with lowered privileges because of susceptibility to attacks. Because they are not dropped, these privileges may be gained by an attacker if LPRng is vulnerable to such attacks.

Rumpus FTP Server Denial of Service

Rumpus FTP Server is an implementation for MacOS which allows file-sharing across TCP/IP connections. An ftp user can engage the attack by making a directory with an unusual number of sub-folders, forcing the software to quit, as it is unable to handle the creation of so many directories at one time. The FTP server must be rebooted to regain normal functionality. It is required that a user be logged in to carry out this attack, and executing command 'mkdir A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A:A' will make Rumpus quit.

Apache Webserver Vulnerability on Mac OS X Client

When Apache webserver is used with Mac OS X Client, the standard filesystem for Mac OS X is HFS+ which is case insensitive while Apache's filtering is case sensitive. This results in Apache filtering all file requests that match filters exactly (including case), but not filtering requests made with mixed or upper case characters. This allows unprivileged remote users to access arbitrary privileged files.

Recent Exploits: