header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Snort Remote Denial of Service Vulnerability

The vulnerability exists in the DecodeTCPOptions() function of 'decode.c' in Snort. It is caused by a failure to handle malicious TCP packets properly. A remote attacker can exploit this vulnerability to crash a remote Snort server, preventing subsequent malicious attacks from being detected.

Remote SQL Injection vulnerability in 2Bgal

A remote SQL injection vulnerability reportedly affects 2Bgal. This issue is due to a failure of the application to properly sanitize user-supplied input prior to including it in an SQL query. An attacker may leverage this issue to manipulate SQL query strings and potentially carry out arbitrary database queries. This may facilitate the disclosure or corruption of sensitive database information.

PhpGroupWare HTML Injection Vulnerability

PhpGroupWare is susceptible to a HTML injection vulnerability due to improper input sanitization. An attacker can exploit this vulnerability by supplying malicious HTML and script code through the 'date' parameter in the 'index.php' page. This can lead to theft of cookie-based authentication credentials and control over the site's rendering.

Remote File Include Vulnerability in phpGroupWare

The phpGroupWare software is prone to a remote file include vulnerability that may allow an attacker to execute arbitrary PHP code. The vulnerability exists in the 'tables_update.inc.php' script, which includes other PHP files without proper validation. An attacker can exploit this vulnerability by supplying a malicious file parameter in the URL, leading to the execution of the included PHP code.

e_Board Directory Traversal Vulnerability

The e_Board application is vulnerable to a directory traversal vulnerability due to improper input sanitization. By including '../' directory traversal sequences and a NULL (%00) in the affected URI argument, an attacker can include the contents of arbitrary web-server readable files in the output of the requested page.

PHP shared memory module (shmop) Integer Handling Vulnerability

The PHP shared memory module (shmop) is prone to an integer handling vulnerability. The issue exists in the PHP_FUNCTION(shmop_write) function and is a result of a lack of sufficient sanitization performed on 'offset' data. This vulnerability may be exploited to make an almost arbitrary write into process memory. It is reported that the vulnerability may be leveraged to disable PHP 'safe mode', which may result in further compromise in a shared-server environment.

Local Privilege Escalation in diag

The vulnerability exists in diag applications due to a failure to implement security controls properly when executing an application specified by the 'DIAGNOSTICS' environment variable. A local attacker can exploit this vulnerability to gain superuser privileges on a computer running the affected software. The attacker can create a directory and set the 'DIAGNOSTICS' environment variable to that directory. Then, by executing a specially crafted script, the attacker can escalate their privileges and gain superuser access.

Recent Exploits: