header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer overrun in O’Reilly WebSite Professional’s webfind.exe

Certain versions of O'Reilly WebSite Professional's web server package ship with a utility called 'webfind.exe' that contains a remotely exploitable buffer overflow. This allows a remote user to execute arbitrary commands on the server by providing unchecked user input through a search page. The buffer overrun occurs in the 'QUERY_STRING' variable derived from the user's search keywords. The provided code is a proof of concept that launches the 'calc.exe' window on the server's machine.

Netzero Weak Encryption Vulnerability

Netzero, a free internet service provider, stores the username and password locally in a text file called id.dat. The encryption used for storing the credentials is weak and can be easily decrypted. The exploit allows malicious users to decrypt the username and password using a simple substitution cipher.

PHORUM 5 arbitrary local inclusion exploit

This is an exploit for Phorum 5 that allows for arbitrary local file inclusion. It works if the target server has register_globals set to On and magic_quotes_gpc set to Off. The exploit requires a valid user account and can execute shell commands. It supports options for specifying a different port or using a proxy. The examples provided demonstrate how to use the exploit with different commands and options.

Vulnerability in rpc.statd program

A remote attacker can execute code as root by exploiting the format-string vulnerability in the 'rpc.statd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions. The attacker can construct a format string that injects executable code into the process address space and overwrites a function's return address, thus forcing the program to execute the code.

Cvsweb 1.80 Insecure Perl OPEN Function Call

Cvsweb 1.80 makes an insecure call to the perl OPEN function, providing attackers with write access to a cvs repository the ability to execute arbitrary commands on the host machine. The code that is being exploited here is the following: open($fh, "rlog '$filenames' 2>/dev/null |"). An attack allows the attacker to execute arbitrary commands on the host machine by visiting the CVSweb page or waiting for someone else to do the same.

PhpBB 3 memberlist.php/’ip’ argument SQL injection / admin credentials disclosure

This exploit allows an attacker to disclose admin credentials through an SQL injection vulnerability in the 'ip' argument of the memberlist.php file in PhpBB 3. It works regardless of php.ini settings and requires a global moderator account with 'simple moderator' role.

Reflected XSS and Blind SQL Injection in AlienVault

The AlienVault application is vulnerable to a reflected XSS attack in the 'url' parameter of 'top.php'. An attacker can entice a logged-in user to visit a malicious URL and hijack their session. Additionally, there is a blind SQL injection vulnerability in the 'tcp_port' parameter of 'base_qry_main.php' that allows an attacker to extract the admin hash. The vulnerability was reported to CERT on 28 May 2012 and publicly disclosed on 23 Jul 2012.

Remote Buffer Overflow in Canna Package

By supplying an overly large username or groupname with the IR_INIT command, it is possible to trigger a remote buffer overflow condition. Successful exploitation will enable a remote attacker to execute arbitrary code as the user the canna server is running as.

BitchX IRC client Denial of Service and Remote Code Execution

BitchX IRC clients, versions 75 up to and including 1.0c16, are vulnerable to a Denial of Service and possible remote execution of code. By /invite-ing someone to a channel name containing formatting characters (%s, %n, etc) an IRC user can cause the targetted user's BitchX client to seg-fault. This is caused by the fact that bitchx passes the channel name from the invite into the logging function as its format string [which is used directly in a vsprintf], rather than as an argument to the format. This also affects the KILL command.

Recent Exploits: