header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unchecked Buffer in FrontPage Server Extensions (Visual InterDev RAD Remote Deployment Support)

A specially crafted request via 'fp30reg.dll' could allow a user to execute arbitrary commands in the context of IWAM_machinename on a host running IIS 5.0. A host running IIS 4.0 could allow the execution of arbitrary commands in the SYSTEM context.

Windows Index Server and Indexing Service idq.dll ISAPI Extension Buffer Overflow Vulnerability

A maliciously crafted request could allow arbitrary code to run on the host in the Local System context. This vulnerability is currently being exploited by the 'Code Red' worm.

Windows Index Server and Indexing Service idq.dll Remote Code Execution Vulnerability

A buffer overflow vulnerability exists in the 'idq.dll' ISAPI extension of Windows Index Server and Indexing Service. A remote attacker could exploit this vulnerability by sending a maliciously crafted request, allowing arbitrary code execution in the Local System context. This vulnerability is currently being exploited by the 'Code Red' worm.

Rxvt Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in rxvt. The error occurs when certain command line options with long arguments are passed to rxvt. Because rxvt is installed setgid 'utmp' by some system configurations, it may be possible for local users to execute arbitrary code/commands with these privileges.

Winlog Lite SCADA HMI system SEH 0verwrite Vulnerability

The Winlog Lite SCADA HMI system is vulnerable to a SEH 0verwrite exploit. By injecting data into the Application Name field and selecting the Build option in the Tools menu, an attacker can execute arbitrary code. The exploit involves a buffer overflow of 9986 bytes, a pointer to the next SEH record, a SE handler, a non-SafeSEH address for bypassing SafeSEH protection, a NOP instruction, a jump to the ESP register, and a shellcode.

Arbitrary Command Execution in cgiCentral’s Webstore

The cgiCentral's Webstore application is vulnerable to arbitrary command execution. The vulnerability exists in the Ws_mail.cgi script, which calls system() with user-supplied data without proper input validation. An attacker with administrative privileges can exploit this vulnerability to execute arbitrary commands on the webserver host. Remote attackers who can authenticate as administrators may also be able to exploit this vulnerability to gain access to the host.

Webstore Authentication Bypass

A vulnerability exists in Webstore which may allow attackers to obtain administrative privileges. The vulnerability is due to a lack of filtering NULL bytes and occurs during the authentication process. In combination with BID 2861, an attacker may be able to execute arbitrary commands on a webserver running Webstore.

Recent Exploits: