header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DaZPHP

DaZPHP is vulnerable to a directory traversal attack which allows an attacker to read arbitrary files from the server. This is due to a lack of proper sanitization of user-supplied input to the 'prefixdir' parameter in the 'makepost.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing directory traversal sequences (e.g. '../../../../../../etc/passwd') to the vulnerable script.

XnView 1.92.1 Slideshow “FontName” Buffer Overflow

XnView 1.92.1 Slideshow "FontName" Buffer Overflow is a vulnerability found by Stefan Cornelius, Secunia Research in 2008. It allows an attacker to execute arbitrary code on the vulnerable system. The exploit is written in Perl and creates a poc.sld file which contains a malicious fontname. The malicious fontname contains a shellcode which executes calc.exe on the vulnerable system.

Online FlashQuiz 1.0.2 Remote File Inclusion Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'base_dir' parameter to '/component/com_onlineflashquiz/quiz/common/db_config.inc.php' script. A remote attacker can execute arbitrary PHP code on the vulnerable system by including a malicious file.

Mcafee EPO 4.0 (and others) FrameworkService.exe DOS

A denial of service vulnerability exists in McAfee EPO 4.0 (and others) FrameworkService.exe. An attacker can send a specially crafted HTTP request with a large number of 'B' characters followed by a valid HTTP request to trigger this vulnerability. This will cause the service to crash, resulting in a denial of service condition.

HP OpenView NNM 7.5.1 OVAS.EXE Pre Authentication SEH Overflow

HP OpenView NNM 7.5.1 OVAS.EXE is vulnerable to a pre-authentication SEH overflow. This vulnerability was found, analysed and exploited as part of a training module in 'BackTrack to the Max'. An attacker can send an overly long string to the vulnerable application and overwrite the SEH handler, allowing for arbitrary code execution.

Recent Exploits: