header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ShoutBox Remote Command Execution

The vulnerability allows an attacker to execute arbitrary commands on the target system remotely through the ShoutBox script. By manipulating the 'sb_include_path' parameter, an attacker can include a malicious file that contains the command to be executed. This can lead to unauthorized access, data theft, and other malicious activities.

dtmail Buffer Overflow

A buffer overflow in dtmail makes it possible for a local user to gain elevated privileges. Due to improper bounds checking, it is possible to cause a buffer overflow in dtmail by filling the MAIL environment variable with 2000 or more characters. This results in the overwriting of stack variables, including the return address, and can allow a local user to gain an effective GID of mail.

Remotely Exploitable Denial of Service Vulnerability in Quake 3 Network Play Features

A hostile client program can be used to generate a large number of forged client queries on behalf of a target user. The server's responses flood the target user, consuming the target system's network bandwidth and CPU cycles. Other games may also be affected by similar issues, and additional amplification attacks may be possible through the usage of commands that return detailed information about the game status or server information.

Malicious Archive File Unzip Vulnerability

An attacker can create a malicious archive file with an unusually high compression ratio. When this file is uncompressed by a scanner process, it can consume significant amounts of available disk space.

Admidio 2.3.5 Multiple security vulnerabilities

Admidio 2.3.5 is prone to XSS and SQLi vulnerabilities. The SQLi vulnerability can be exploited by sending a malicious request to 'adm_program/modules/lists/lists.php?active_role=' parameter. The XSS vulnerability can be exploited by injecting a script in the 'headline' parameter of 'adm_program/modules/guestbook/guestbook_new.php'.

TCP MSS Denial of Service Vulnerability

A potential denial of service vulnerability exists in several TCP stack implementations. TCP has a MSS (maximum segment size) option that is used by a TCP client to announce to a peer the maximum amount of TCP data that can be sent per segment. By setting the MSS to a low value (such as 1) and making requests for large amounts of data through a TCP service, an attacker could effectively cause a denial of service by causing a large workload on a system.

Oracle TNS Listener Remote Buffer Overflow

There exists a remotely exploitable buffer overflow in Oracle TNS Listener component, which allows remote attackers to execute arbitrary code on affected hosts without requiring authentication. On Windows 2000/NT4 systems, the TNS Listener runs with 'LocalSystem' privileges, giving the attacker full control over the system. On Unix systems, exploitation of this vulnerability would provide an attacker with local access to the victim host.

Linux /proc Filesystem Access Validation Error

Under certain circumstances, an access validation error may exist in the handling of process-specific 'mem' files in the Linux /proc filesystem. This could allow an attacker to reposition the read offset of the file to an arbitrary location prior to executing a setuid program that obtains data from stdin.

Icecast Denial of Service Vulnerability

Icecast audio-streaming server does not properly sanitize user-supplied input, allowing remote attackers to cause a denial of service (crash) by adding a slash, backslash, or period to the end of a crafted URL.

Recent Exploits: