header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BIND 8.0.x named Daemon Vulnerability

The named daemon in BIND 8.0.x will dump the named database to /var/tmp/named_dump.db when it receives a SIGINT signal and append named statistics to /var/tmp/named.stats when it receives a SIGIOT signal. It does not check for symbolic links while doing so and can be made to overwrite or append to any file in the system.

Digital UNIX 4.0 Core File Symlink Vulnerability

Digital UNIX 4.0 will follow symlinks while writting core files if two setuid programs dump core in sucession. The core file is owned by root but with the user's groud id. The core file permissions are 0600. This can be used to create root owned file anywhere in the filesystem.

LicenseManager(1M) Arbitrary File Manipulation Vulnerability

Under normal operation LicenseManager(1M) is a program used to view and manage FLEXlm and NetLS software licenses. Unfortunately, a set of vulnerabilities has been discovered that allows LicenseManager(1M) to arbitrary manipulate root-owned files allowing root access. To exploit this vulnerability, an attacker must create a directory, set the environment variable LICENSEMGR_FILE_ROOT to the directory, create a license.dat file, create a symbolic link from license.dat.log to /.rhosts, and then run LicenseManager. When the attacker clicks on Update, fills in the four fields with any information and clicks on Apply, LicenseManager will report an error. Ignoring the error and exiting will allow the attacker to access the root-owned file /.rhosts.

LicenseManager(1M) Overwrite Root-Owned Files

LicenseManager(1M) is a program used to view and manage FLEXlm and NetLS software licenses. A vulnerability has been discovered that allows LicenseManager(1M) to overwrite root-owned files, such as /.rhosts, with arbitrary content. This can be exploited to gain root access if remote root logins are enabled.

A vulnerability exists in inetd

A vulnerability exists in inetd which allows a remote user to crash inetd if the tcpmux service is not commented out of /etc/inetd.conf. The tcpmux service is defined in RFC1078. It is also claimed inetd will die if the Windows 95/NT program postscan.exe, made by 7thsphere, is run againts the host.

Security Vulnerability with CGI Program pfdisplay.cgi

The vulnerability exists in the pfdisplay.cgi program distributed with IRIX. It allows an attacker to inject arbitrary commands into the program, which are then executed with the privileges of the web server. This can be exploited by sending a specially crafted HTTP request to the vulnerable CGI program.

Recent Exploits: