header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SimpleBBS <= v1.1 remote commands execution in c

SimpleBBS <= v1.1 is vulnerable to remote command execution. An attacker can execute arbitrary commands on the vulnerable system by sending a specially crafted request to the vulnerable server. This vulnerability can be exploited by sending a malicious request to the vulnerable server with the command to be executed as a parameter.

An open security advisory #14 – Appfluent Database IDS Environment Variable Overflow

There is a stack based buffer overflow in all binaries that allow for some malicious attacker to gain unauthorised code execution on the system where the application is installed. Due to incorrect use of strcpy(), and a lack of correct bounds checking, a user can manipulate the $APPFLUENT_HOME environment variable to gain code execution.

The easy way by logic logidev@gmail.com (line 2) untested /str0ke

This program was originally written in the due course of writing 'Hacking Exposed Cisco Networks: Cisco Security Secrets and Solutions' book. Tool author - Janis Vizulis, Arhont Ltd. It is a perl script which uses Getopt::Long, Net::RawIP and Term::ProgressBar perl modules to send a TCP packet with SYN flag set to a destination IP and port. It also allows to set source and destination MAC address and IP address.

FileZillaDoS.cpp

FileZilla Server Terminal 0.9.4d is vulnerable to a Denial of Service (DoS) attack. The vulnerability is caused due to a boundary error when handling user input. This can be exploited to cause a stack-based buffer overflow by sending an overly long string to the affected server. This may allow an attacker to cause a DoS condition or potentially execute arbitrary code.

Google Appliance ProxyStyleSheet Command Execution

This module exploits a feature in the Saxon XSLT parser used by the Google Search Appliance. This feature allows for arbitrary java methods to be called. Google released a patch and advisory to their client base in August of 2005 (GA-2005-08-m). The target appliance must be able to connect back to your machine for this exploit to work.

FTGate Imapd BufferOverrun

This exploit is for FTGate Imapd BufferOverrun vulnerability. It uses IO::Socket to connect to the host on port 143 and sends a malicious payload of 224 bytes followed by 11305 bytes of C characters. This causes a buffer overflow and allows the attacker to execute arbitrary code.

PHPWebThings 1.4 “msg” and “forum” SQL injection / Administrative credentials disclosure and remote commands execution

This exploit is based on a more critical injection in the 'msg' parameter that works with magic_quotes_gpc on. It allows an attacker to gain administrative credentials disclosure and remote commands execution.

Recent Exploits: