header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Websense Email Security Web Administrator DoS

The Web Administrator frontend (STEMWADM.EXE) listens by default on port TCP/8181. If an attacker sends a HTTP Request to port 8181 without waiting for a response the webserver crashes. The proof of concep code is available below. The webserver is restarted automatically after the crash.

TwonkyMedia Server Multiple Cross-Site Scripting Vulnerabilities

TwonkyMedia Server contains multiple Cross-Site Scripting (XSS) vulnerabilities. The TwonkyMedia web server fails to adequately sanitize user input (HTTP request strings and form input); thus, an attacker may be able to execute arbitrary script code in a victim's browser.

Alteon OS BBI (Nortell) – Multiple Vulnerabilities

Various XSS and XSRF vulnerabilities were identified in the Alteon OS Browser-Based Interface (BBI). An attacker may exploit this issue to perform certain administrative actions, e.g. change using predictable URL requests once the user has authenticated and obtained a valid session with the switch. An attacker may exploit this issue to inject arbitrary HTML and script code into the application, potentially allowing the attacker to steal cookie-based authentication credentials and launch other attacks.

Snort <= 2.8.5 IPV6 Remote DoS

A remote DoS was present in Snort 2.8.5 when parsing some specialy IPv6 crafted packet. To trigger theses bugs you need to have compiled snort with the --enable-ipv6 option, and run it in verbose mode (-v). You can reproduce theses two differents bugs easily by using the Python low-level networking lib Scapy (http://www.secdev.org/projects/scapy/files/scapy-latest.zip)

SharePoint Team Services source code disclosure through download facility

It was found that the download facility of Microsoft SharePoint Team Services can be abused to reveal the source code of ASP.NET files. Insufficient validation in the input parameters of the download facility can result in the source code of ASP.NET files being disclosed. For example, the source code of the default ASP.NET page available after installing the product (http://server/Pages/Default.aspx) can be obtained by issuing the following request: http://server/_layouts/download.aspx?SourceUrl=/Pages/Default.aspx&Source=http://server/Pages/Default.aspx&FldUrl= In order to retrieve the source code any file stored in the backend database (files whose path does not start with /_layout/) it is sufficient to craft a request that follows this pattern: http://server/_layouts/download.aspx?SourceUrl=<relative_path>&Source=<full_path>&FldUrl= This bug can result in disclosure of sensitive information that can be used by an attacker targeting the application.

Recent Exploits: