header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote File Retrieval in MetaInfo Products

The MetaWeb server bundled with MetaInfo products does not restrict access to the root directory, allowing an attacker to retrieve known files by using the /../ notation to escape to higher levels of the file structure. This vulnerability can be exploited through the web UIs of products like MetaIP and Sendmail, and can be used to retrieve sensitive files such as password files.

Arbitrary Code Execution in Cheyenne Inoculan

It is possible to run arbitrary code on any Intel machine running Cheyenne Inoculan version 4.0 for Windows NT prior to SP2. Inoculan runs as a service, called "Cheyenne InocuLAN Anti-Virus Server". When it starts, it replaces any shared directory with the same name and shares "CHEYUPD$" with full control for the everyone group. When the service starts, it does an update check in this directory (usually "C:InoculanUpdate") using the files ""<NtBox>CHEYUPD$EnglishNtIntelReadyfilelist.txt"" and [idem]...avh32dll.dll. Simply ""touching"" or modifying the file ""filelist.txt"" to look younger than real causes the update. The update causes the service to stop

Bug in Advance Micro Devices K6 processor allows non-privileged code to crash the machine

A bug in the Advance Micro Devices K6 processor allows non-privileged code to crash the machine. The exploit code provided demonstrates how this can be achieved by accessing an invalid address that resembles an already cached address. The bug can be triggered by loading the address of something in a deep cache on the CPU, such as the _start function. The vulnerability can be mitigated under Linux 2.1.x.

Buffer Overflow in Lynx’s Mailer

There exists a buffer overflow in Lynx's built-in mailer that can be exploited when the victim tries to follow a hyperlink. Lynx makes blind assumption on e-mail address length, and sprintfs it into 512-bytes long buffer. The vulnerability is in LMail.c as part of the processing of "mailto:" URLs. The overflow can be triggered by using a 'mailto' hyperlink with a large amount of data, specifically over 2 kB of 'A's. This can lead to arbitrary code execution or a denial of service.

Buffer Overflow in Qualcomm’s Eudora Internet Mail Server

There is a buffer overflow vulnerability in Qualcomm's Eudora Internet Mail Server. By connecting to its TCP port number 106 and issuing the USER command followed by a string over a thousand bytes in length, the server can crash, potentially causing the machine to go down.

WordPress content-flow3d Arbitrary File Upload

This exploit allows an attacker to upload arbitrary files to a vulnerable Wordpress plugin called content-flow3d. The attacker needs to provide the target URL as a command-line argument. The exploit uses cURL to send a POST request to the upload.php file of the plugin with a file named bazinga.php.jpg. The exploit is tested on CentOS and Ubuntu Server 11.04.

Recent Exploits: