header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Solaris wall Client Spoofing

The wall client packaged with Solaris makes assumptions about a user's environment when the client is executed. The assumption is made that if the file descriptor of stderr points to a tty when wall is executed, the user is local. If not, the user is considered remote, and the first five bytes of the supplied 'From' text will be used by wall as the users identification. This makes it possible for a user to close stderr prior to the execution of wall, and send a spoofed message using the client.

Denial of Service Vulnerability in PHP-Nuke

The modules.php script used by PHP-Nuke is vulnerable to a denial of service attack due to improper validation of some URI parameters. An attacker can exploit this vulnerability by modifying certain parameters in a request for the modules.php script, which will prevent visitors from creating new accounts and cause a denial of service.

Security Manager Plus <= 5.5 build 5505 Remote SYSTEM/root SQLi (Win+Linux)

The SQL injection is possible on the "Advanced Search", the input is not validated correctly. To make it even worse, the search can be accessed without any authentication. Security Manager Plus also has to run as root or SYSTEM user, which makes a remote shell with root/SYSTEM privileges possible....

Security Manager Plus <= 5.5 build 5505 Path Traversal (Win+Linux)

The Path Traversal is possible on the 'store' url, without any authentication. This allows us to download the complete database and thus gather windows/linux logins which are used for patching the servers. It will also download the passwd and shadow files as Security Manager Plus runs with root/SYSTEM privileges. Modify it to make it work on windows, and grab SAM files or other files. NOTE: At least one patch must have been downloaded in Security Manager Plus already.

Directory Listing Disclosure in Ultimate PHP Board

Under some circumstances, it may be possible to disclose the contents of directories. By passing a malicious request to the viewtopic.php script, UPB may return a listing of the directory. This could be further refined to disclose the contents of selected files.

Boozt Buffer Overflow Vulnerability

A vulnerability has been discovered in Boozt. By passing a malicious parameter of excessive length to the index.cgi script, it is possible to overrun a buffer. This could be exploited by a remote attacker to corrupt sensitive memory, which may result in the execution of arbitrary code.

Buffer Overflow Vulnerability in Moby NetSuite

A buffer overflow vulnerability has been reported for Moby NetSuite that may result in a denial of service condition. It is possible to cause NetSuite to crash when a malformed POST request is received. An attacker can exploit this vulnerability by issuing a malformed POST request. When NetSuite attempts to service the malformed POST request, it will crash resulting in a denial of service. Restarting the service is necessary to restore functionality.

Recent Exploits: