header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OBOphiX [fonctions_racine.php] <= 2.7.0 Remote File Include Vulnerability

A vulnerability exists in OBOphiX [fonctions_racine.php] version 2.7.0 and earlier, which allows a remote attacker to include arbitrary files on the system. The vulnerability is due to the 'chemin_lib' parameter in the 'fonctions_racine.php' script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability to include arbitrary files from remote web servers, which can lead to the execution of arbitrary code on the vulnerable system.

Linux sock_sendpage() NULL pointer dereference exploit

This is the second version of Linux sock_sendpage() NULL pointer dereference exploit. Now, it also works with Linux kernel versions which implements COW credentials (e.g. Fedora 11). For SELinux enforced systems, it automatically searches in the SELinux policy rules for types with mmap_zero permission it can transition, and tries to exploit the system with that types.

Novell eDirectory 8.8 SP5 Denial of Service Vulnerability

Novell eDirectory 8.8 SP5 is vulnerable to a denial of service attack. If a remote attacker sends Unicode strings with Http Request to '8028 port' ('8028' is the default port of Novell eDirectory Dhost Http Server), the attacker can cause the system to consume %100 of the CPU resources.

HTMLDOC ‘html’ File Handling Remote Stack Buffer Overflow Exploit (Linux)

This exploit is for HTMLDOC 1.8.27 on Debian 5.0 (+ASLR). It is a remote stack buffer overflow exploit which creates a buffer of 512 bytes and then appends the shellcode to it. The shellcode is XOR encoded and binds a port 4444. The exploit is written in C language and is coded by Pankaj Kohli. The exploit file is written to sploit.html and is run as htmldoc -f somefile.pdf sploit.html.

Windows Vista, Server 2008 < R2, 7 RC : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D.

SRV2.SYS fails to handle malformed SMB headers for the NEGOTIATE PROTOCOL REQUEST functionnality. The NEGOTIATE PROTOCOL REQUEST is the first SMB query a client send to a SMB server, and it's used to identify the SMB dialect that will be used for futher communication.

Joomla Compenent Com_joomlub (aid) Remote SQL Injection Vulnerabilities

The vulnerability exists due to insufficient filtration of user-supplied data passed via the 'aid' parameter to the '/index.php' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to read, modify or delete arbitrary data in the database, disclose sensitive information, bypass certain security restrictions, and compromise the application and the underlying system.

Cisco ASA/PIX Denial of Service Vulnerability

A vulnerability in Cisco ASA/PIX versions 6.3, 7.0, 7.1, 7.2, 8.0, 8.1, and 8.2 can be triggered by sending a specially crafted packet with a large window size. This will cause the device to crash and reload, resulting in a denial of service. The only way to recover from the denial of service is to reload the device.

Digital Security Research Group [DSecRG] Advisory #DSECRG-09-036

DiViS DVR System web-server which fingerprints as Techno Vision Security System has Directory Traversal vulnerability. Successfully exploiting these issues allows remote attackers to access the contents of arbitrary files.

Recent Exploits: