header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP sscanf Vulnerability

This exploit takes advantage of a vulnerability in the sscanf function in PHP. By providing a format argument with argument swap and extra arguments, an attacker can overwrite memory and execute arbitrary code. The exploit involves filling PHP's internally cached memory with the address of a pointer to a writable segment, unsetting a variable to free the memory but not zero it, and passing our own pointers to sscanf. By constructing a binary zval structure with shellcode, we can successfully call sscanf and execute code.

Buffer Overflow in Microsoft Internet Explorer, Proxy Server, and ISA Server

The vulnerability exists in the component that parses gopher replies. A malicious server is able to send a reply that will overflow the buffer and run arbitrary code on a user's system.

CMailServer Buffer Overflow

CMailServer is vulnerable to a buffer overflow condition. It does not perform proper bounds checking on the USER argument, allowing a remote attacker to execute arbitrary code on the system. This exploit allows for denial of service or the creation of a bind shell on port 61200. It has been tested on Windows 2000 SP3 English.

CMailServer Buffer Overflow Vulnerability

CMailServer is vulnerable to a buffer overflow condition. It does not perform proper bounds checking on the USER argument, allowing a remote attacker to execute arbitrary code on the vulnerable system. The issue has been reported in CMailServer 3.30, but other versions may also be affected. The exploit code provided in the text demonstrates the ability to execute arbitrary code on a Windows 2000 system.

Directory Traversal in Hosting Controller DSNManager

The DSNManager script in Hosting Controller does not properly filter dot-dot-slash sequences from URL parameters, allowing an attacker to perform directory traversal attacks. By exploiting this vulnerability, an attacker can disclose the contents of arbitrary web-readable files or potentially add a Data Source Number (DSN) to an arbitrary directory.

Same Origin Policy Bypass in Opera Browser

The vulnerability allows an attacker to bypass the same origin policy in some versions of the Opera Browser. By modifying the location property of an IFRAME or FRAME included in the document, an attacker can execute script code within the context of the previous frame site. This can lead to potential information disclosure or unauthorized actions.

3CDaemon FTP Server Buffer Overflow

A buffer overflow vulnerability exists in 3CDaemon FTP server, allowing malicious users to execute arbitrary code on the server by sending an unusually large amount of data to trigger a stack-based overflow condition. Sending random data could also cause the application to crash.

Buffer Overflow in Screen

Under some circumstances, it may be possible for a local user to take advantage of a buffer overflow in screen. Due to insufficient bounds checking performed by the braille module of screen, it is possible for a local user to pass long strings of data to the screen program, which could result in an overflow, and the overwriting of process memory. This could result in the execution of arbitrary code.

Recent Exploits: