header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

HTTPDX h_handlepeer() Function Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The vulnerability is caused due to a boundary error within the "h_handlepeer()" function in http.cpp. By sending an overly long HTTP request, an attacker can overrun a buffer and execute arbitrary code.

httpdx <= 1.4.6b Remote Source Disclosure

httpdx Web Server <= 1.4.6b is a Windows based HTTP server. This is the latest version of the application available. httpdx is vulnerable to remote arbitrary source code disclosure by the following means. http://[ webserver IP]/[ file ][.%20] http://172.16.2.101/index.html.%20 http://172.16.2.101/test.py.%20 http://172.16.2.101/test.php.%20

Eureka Mail Client Remote Buffer Overflow Vulnerability

Eureka Mail Client is vulnerable to a remote buffer overflow vulnerability due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted request to the POP3 service, resulting in arbitrary code execution. This vulnerability affects Eureka Mail Client version 2.2q on Windows XP Professional SP2.

Endonesia 8.4 CMS Local File Inclusion Vulnerability

Endonesia 8.4 CMS is vulnerable to Local File Inclusion due to a lack of proper sanitization of user-supplied input in the mod.php file. An attacker can exploit this vulnerability by sending a crafted HTTP request with a maliciously crafted mod parameter. This can allow an attacker to read arbitrary files on the server, such as /etc/passwd, or execute arbitrary code.

DWebPro Remote Execution Vulnerability

The last version of DWebPro allows an invader to execute any program by entering a URL in the browser. The URL contains the file path of the program to be executed and the parameters to be passed to the program. An attacker can also use the URL to download a file from a remote server.

DEDECMS Sql Injection Vulnerability

A SQL injection vulnerability exists in DEDECMS 5.1 due to improper sanitization of user-supplied input in the 'arcurl' parameter of the 'feedback_js.php' script. An attacker can exploit this vulnerability to execute arbitrary SQL commands in the application's database, allowing them to access or modify sensitive data.

CubeCart 4 Session Management Bypass

While auditing the source code of CubeCart version v4.3.4, I've found a critical vulnerability in this application. Basically, session managament for administrative users is flawed. It's easy to bypass it without providing any credentials. An attacker can later perform any actions the administrator can, such as dumping the database, install modules (PHP code execution) and so on.

Directory Traversal Vulnerabilities

When handling HTTP requests, Boxalino does not properly check for directory traversal specifiers. Therefore, by including a sequence such as "../../../", an attacker is able to read files outside of the intended location. The vulnerability exists for both, Windows and UNIX based systems.

Recent Exploits: