header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Ezhometech EzServer <=6.4 Stack Overflow Vulnerability

Buffer overflow condition exist in URL handling, sending long GET request will cause server process to exit and may allow malicious code injection. Further research found that the application does not care about the HTTP method, so that by sending long characters will make the program crash.

Buffer Overflow Vulnerabilities in Debian netstd Package

The netstd package in Debian GNU/Linux is vulnerable to two buffer overflow attacks. The first vulnerability is present in the bootp server, while the second vulnerability exists in the FTP client. The bootp server vulnerability can allow a remote attacker to fully compromise a vulnerable host by exploiting improper bounds checking in the handling of boot file/location specified in a bootp request packet and in the error logging facility. The FTP client vulnerability can be exploited by a local attacker to potentially elevate privileges.

Autofs Kernel Module Directory Name Overflow Vulnerability

The autofs kernel module does not check the size of the directory names it receives. It is passed the name and the names length through dentry->d_name.name and dentry->d_name.len respectively. Later on, it memcpy()'s the name into a 256 byte buffer, using dentry->d_name.len as the number of bytes to copy, without checking its size. A nonprivileged user may attempt to cd to a directory name exceeding 255 characters. This overwrites memory, probably the kernel stack and anything beyond it, and causes kernel errors or makes the machine reboot.

IBM Remote Control Software Privilege Escalation Vulnerability

The IBM Remote Control Software package allows a local user with a user-level account to execute code with administrator privileges. This vulnerability can be exploited by launching arbitrary code from the Process Manager interface, such as usrmgr.exe, musrmgr.exe, and regedt32.exe. The user can use these programs to grant administrator privileges to any account on the host or domain.

Joomla <= 1.0.9 'Weblinks' blind SQL injection / admin credentials

This exploit allows an attacker to retrieve the admin credentials of a Joomla website through a blind SQL injection vulnerability in the 'Weblinks' component. The exploit is a disclosure exploit and is a modified version of a previous exploit for Mambo. It includes an always true statement to avoid flooding the admin with email notifications about submissions. The exploit works even though the submissions do not succeed.

Serv-U FTP Server Buffer Overflow

The Serv-U FTP server versions 2.5 and earlier are vulnerable to multiple buffer overflows. This can result in a denial of service and at worst in arbitrary code being executed on the system. The vulnerabilities are in the CWD and LS FTP commands if they are passed an argument a string longer than 155 characters.

Recent Exploits: