header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

WebBBS Buffer Overflow Vulnerability

Certain versions of WebBBS by Mike Bryeans of International TeleCommunications contain a flaw in the initial login program. User supplied data via the login name and password are not bounds checked and can result in a buffer overflow. This leads a compromise of the system running WebBBS.

CLscript CMS v3.0 – Multiple Web Vulnerabilities

Multiple SQL Injection vulnerabilities are detected in the CLscript v3.0 Content Management System. The vulnerability allows an attacker (remote) to inject/execute own sql commands on the affected application dbms. The vulnerabilities are located in the userDetail.php, advertise_detail.php or land.php files.

GuestBook Scripts PHP v1.5 – Multiple Web Vulnerabilities

The GuestBook Scripts PHP v1.5 is vulnerable to multiple web vulnerabilities. The script allows visitors to leave comments and feedback on a website. However, it has several security issues including HTML and JavaScript injections, lack of input validation, and insufficient protection against spam. These vulnerabilities can potentially lead to unauthorized access, data manipulation, and denial of service attacks.

Services.exe Denial of Service

A specially crafted packet can cause a denial of service on an NT 4.0 host, rendering local administration and network communication nearly unusable. This attack will crash the 'services' executable, which in turn, disables the ability for the machine to perform actions via named pipes. As a consequence, users will be unable to remotely logon, logoff, manage the registry, create new file share connections, or perform remote administration. Services such as Internet Information Server may also fail to operate as expected. Rebooting the affected machine will resolve the issue, provided it is not attacked again.The problem lies within the manner that srvsvc.dll makes calls to services.exe. Certain MSRPC calls will return NULL values which are not correctly interpreted by services.exe. This, in turn, may lead to a crash of Services.exe.If this denial of service is combined with a number of other exploits, it may be possible to have this attack spawn a Debugger (ie Dr Watson) call on the host, which, if trojaned, may execute malicious code on the target host.

Directory Traversal Vulnerability in URL Live! free webserver from Pacific software

The URL Live! free webserver from Pacific software is susceptible to the "../" directory traversal vulnerability. By using the '../' string in a URL, an attacker can gain read access to files outside the intended web file structure.

Recent Exploits: