header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Mercury imap4 server remote buffer overflow exploit

Mercury imap4 server is vulnerable to a remote buffer overflow exploit. The exploit is triggered when a malicious user sends a specially crafted packet to the vulnerable server. The packet contains an overflow string which is larger than the buffer size, resulting in a buffer overflow. The exploit is successful when the malicious user is able to gain access to the server and execute arbitrary code.

Fastream NETFile FTP/Web Server 7.1.2 Professional DoS Exploit

A denial of service vulnerability exists in Fastream NETFile FTP/Web Server 7.1.2 Professional. An attacker can send a specially crafted HTTP request to the server to cause a denial of service condition. This exploit was coded by karak0rsan and the bug was found by bratax ck.

rxBot Stoney FTPd Denial Of Service Exploit

There exists a buffer overflow in Stoneys FTPd that most rxBot mod's use. The problem lies in how the code parses the PORT command and gives an opportunity for a buffer overflow. Problem is that the ftpd also uses select() to handle multiple connections. So when sending the crafted PORT command select() returns NULL making it return and exit the FTPd thread resulting merely in a Denial Of Service of the FTPd with no crash of the bot itself.

phpWebSite SQL-injection

This exploit allows an attacker to gain access to the username and password of a registered user on a vulnerable phpWebSite installation. The exploit works by sending a specially crafted HTTP request to the vulnerable server, which then returns the username and password of the registered user in the response.

Snort <= 2.4.0 Trigger p0c

This code sends a TCP/IP packet with 4 extra bytes corresponding to the TCP Options [TCP Header]. These 4 bytes are "x05x02x00x00". NOTE !!!: Snort only falls when it is running in verbose mode (-v). This only works testing from one machine to another directly connected (1 single jump; Eg. In a LAN network from PC to PC). It does not work from the Internet, because the TCP->th_sum field is 0 (zero), so the first Router through which this packet passes will discard it for not having a valid checksum.

Recent Exploits: