header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Majordomo Perl-based Internet E-mail List Server Arbitrary Command Execution

Specially crafted e-mail headers are incorrectly processed in Majordomo versions prior to 1.91, allowing the execution of arbitrary commands with the privileges of Majordomo. This can be done by including malicious code in the 'Reply-to' field of an email.

Microsoft Internet Information Server (IIS) 3.0 Remote Administration Scripts Information Disclosure Vulnerability

An attacker can remotely access certain scripts in the /scripts/iisadmin directory of Microsoft Internet Information Server (IIS) 3.0, which can lead to the disclosure of sensitive information about the server's directory structure.

MySQL Buffer Overflow Vulnerability

By supplying an excessively long string as an argument for a SELECT statement, it is possible for a local attacker to overflow mysql's query string buffer. As a result of this overflow, excessive data copied onto the stack can overwrite critical parts of the stack frame such as the calling function's return address. Since this data is supplied by the user, it can be made to alter the program's flow of execution.

Denial of Service in Linux Kernel

Linux kernel versions 2.1.89 to 2.2.3 are vulnerable to a denial of service attack caused when a 0-length IP fragment is received, if it is the first fragment in the list. Several thousands 0-length packets must be sent in order for this to initiate a denial of service against the target.

Windows NT SNMP Service Remote WINS Record Deletion

The SNMP service provided with NT Server 4.0 and NT Server 4.0 Terminal Server Edition allow a remote user to delete WINS records, initiating a denial of service against the network. The attacker must know the SNMP community name and be able to access the SNMP service. Regular access control functions are bypassed by the SNMP function, and SNMP community names are often left at their default values (e.g., 'public').

globalSCAPE CuteZIP Stack Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in version 2.1 of CuteZIP. In order for the command to be executed, an attacker must convince the target user to open a specially crafted zip file with CuteZIP. By doing so, an attacker can execute arbitrary code as the target user.

Technote Inc. Multi-Communication Package Arbitrary File Disclosure and Command Execution Vulnerability

The 'main.cgi' script in Technote Inc. Multi-Communication Package allows remote attackers to read arbitrary files and execute arbitrary commands via a ../ (dot dot slash) in the filename parameter.

Recent Exploits: