header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Novell Groupwise Client 7.0.3.1294 Remote DoS

GroupWise is a messaging and collaborative software platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management. The platform consists of the client software, which is available for Windows, Mac OS X, and Linux, and the server software, which is supported on Windows Server, Netware, and Linux. The latest generation of the platform is GroupWise 8, which was launched in 2008. A proof of concept DoS code was released which exploited a vulnerability in the gxmim1.dll file of version 7.0.3.1294 of the GroupWise Client on Windows XP Professional French SP2 and SP3.

Local privilege escalation vulnerability in Protector Plus antivirus software

Protector Plus installs the own program files with insecure permissions (Everyone - Full Control). Local attacker (unprivileged user) can replace some files (for example, executable files of Protector services) by malicious file and execute arbitary code with SYSTEM privileges.

HERO SUPER PLAYER 3000 .M3U File Buffer Overflow POC

A buffer overflow vulnerability exists in HERO SUPER PLAYER 3000 .M3U File, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is caused due to a boundary error when handling .M3U files. By exploiting this vulnerability malicious users can execute arbitrary code on the vulnerable system.

BSR Webweaver Version 1.33 /Scripts access restriction bypass vulnerbility

In ISAPI/CGI path is [%installdirectory%/scripts] and through HTTP the alias is [http://[host]/scripts], The access security check is that if the attacker tries to access /scripts a 404 Error response occurs ! Now to bypass and check the directory listing [That is if Directory Browsing is allowed in the server Configuration !] just copy and paste the exploit url !.

BL!ND SQL Injection Vulnerability

A BL!ND SQL Injection vulnerability was discovered in HotWeb Rentals, a software developed by www.hotwebscripts.co.uk. The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'PropId' parameter to 'details.asp' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can allow the attacker to compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database and compromise the server.

Help Desk Version 3 (Auth Bypass) Remote Sql Injection

Help Desk Version 3 is vulnerable to a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to bypass authentication and gain access to the application.

BigAnt Server version 2.50 SEH Overwrite – 0day

A buffer overflow vulnerability exists in BigAnt Server version 2.50, which could allow an attacker to execute arbitrary code on the vulnerable system. The vulnerability is due to a lack of proper bounds checking of user-supplied data, which can result in a stack-based buffer overflow. An attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable server. Successful exploitation could result in arbitrary code execution in the context of the application.

Recent Exploits: