header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server

A vulnerability has been found that may allow an attacker to execute arbitrary code on servers or home routers running dnsmasq with the TFTP service enabled ('--enable-tfp'). This service is not enabled by default on most distributions; in particular it is not enabled by default on OpenWRT or DD-WRT. Chances of successful exploitation increase when a long directory prefix is used for TFTP. Code will be executed with the privileges of the user running dnsmasq, which is normally a non-privileged one. Additionally there is a potential DoS attack to the TFTP service by exploiting a null-pointer dereference vulnerability.

phpNagios v 1.2.0 (menu.php) LFI Vulnerability

A vulnerability exists in phpNagios v 1.2.0 due to improper validation of user-supplied input in the 'conf[lang]' parameter of the 'menu.php' script. This can be exploited to include arbitrary local files by passing directory traversal strings to the 'conf[lang]' parameter.

com_hestar 1.0.0

An SQL injection vulnerability exists in the com_hestar component 1.0.0 for Joomla! CMS. A remote attacker can send a specially crafted request to the index.php script with the option parameter set to com_hestar and the task parameter set to showlist, and an id parameter set to a malicious SQL statement, which will execute arbitrary SQL commands in the context of the application.

GemStone/S 6.3.1 “stoned” Local Buffer Overflow Exploit

Gemstone/S "stoned" suffers from a local buffer overflow when parsing input either from the "-e" or "-l" flags, which allows a user to specify an exe config file and logfile, respectively. Both use the same buffer that is overflowed and we can overwrite the instruction pointer to control the flow of "stoned". The exploit was tested on Debian 5 (Lenny) and Ubuntu 9.04 (Jaunty Jackalope).

Ipswitch WS_FTP 12 Professional Remote Format String 0day PoC

This PoC exploits a format string vulnerability in Ipswitch WS_FTP 12 Professional. The vulnerability is found in the status code of the HTTP protocol, which can be exploited to cause a denial of service or potentially execute arbitrary code.

Safari 3.2.3 (Win32) JavaScript ‘eval’ Remote Denial of Service Exploit

Safari crashes when interpreting a webpage that calls the "eval" JavaScript function with "A/" repeating 21526 times (43052 bytes). When triggering this vulnerability, Safari will throw a "Stack Overflow" exception, and then an access violation when adjusting the trigger to "A/" repeating 21697 times (43394 bytes). The problem originates in the module "WebKit.dll". Safari uses this module as part of the WebKit layout engine (www.webkit.org).

Joomla Component BF Survey Pro Free SQL Injection Exploit

This exploit allows an attacker to inject malicious SQL code into the vulnerable Joomla Component BF Survey Pro Free. The malicious code is injected into the 'table' parameter of the 'updateOnePage' task of the 'com_bfsurvey_profree' component. This allows the attacker to modify the username, password, and email of the administrator account, allowing them to gain access to the administrator panel.

Recent Exploits: