header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple Vulnerabilities in TinyServer

TinyServer is prone to multiple vulnerabilities, including a directory traversal issue that could allow a remote user to view or download any file to which the server has access, a denial of service issue due to the failure of the server to check input strings received, and a cross-site scripting issue that could allow for theft of cookie-based authentication credentials or other attacks.

OwnServer 1.0 and Earlier File Disclosure Vulnerability

OwnServer 1.0 and earlier is vulnerable to a file disclosure vulnerability, which allows a remote attacker to view files residing outside of the web server root directory on the affected system. This can be done by sending a specially crafted HTTP request containing a maliciously crafted URL, such as http://www.example.com/../../boot.ini, http://www.example.com/../../../boot.ini, http://www.example.com/../../../../boot.ini, http://www.example.com/../../../../../boot.ini, and http://www.example.com/../../../../../../boot.ini.

MetaDot Portal Server Cross-Site Scripting Vulnerability

MetaDot Corporation's MetaDot Portal Server is vulnerable to Cross-Site Scripting (XSS) attacks due to a failure to properly validate user input. An attacker can exploit this vulnerability by sending malicious code in the form of an iframe to the vulnerable server. For example, an attacker can send the following code to the vulnerable server: /index.pl?isa=XSS<iframe%20src=http://www.example.com/malcode> or /index.pl?iid='"><iframe%20src=http://www.exmaple.com/malcode>.

Remote File Inclusion in VisualShapers ezContents

VisualShapers ezContents is vulnerable to a Remote File Inclusion vulnerability due to a lack of proper input validation. An attacker can exploit this vulnerability by crafting a malicious URL and sending it to a victim. If the victim visits the malicious URL, the attacker's malicious code will be executed on the vulnerable system.

Stack Overflow in Webcam Watchdog – Proof of Concept Exploit

A problem has been identified in the handling of remote web requests by the Webcam Watchdog software. Because of this, it may be possible for a remote attacker to gain unauthorized access to a vulnerable system. A proof of concept exploit has been released which demonstrates the vulnerability. It is possible to execute arbitrary code on the vulnerable system by sending a specially crafted HTTP request.

Catman Symlink Vulnerability

This exploit is based on the fact that catman creates files in /tmp insecurly. They are based on the PID of the catman process, catman will happily clobber any files that are symlinked to that file. The idea of this script is to watch the process list for the catman process, get the pid and Create a symlink in /tmp to our file to be clobbered. This exploit depends on system speed and process load.

PHP-Nuke Survey Module SQL Injection Vulnerability

A vulnerability has been reported to exist in the Survey module of PHP-Nuke that may allow a remote attacker to inject malicious SQL syntax into database queries. The source of this issue is insufficient sanitization of user-supplied input. A malicious user may influence database queries in order to view or modify sensitive information, potentially compromising the software or the database.

Cross-Site Scripting in Software

A vulnerability has been reported to exist in the software that may allow a remote user to launch cross-site scripting attacks. The problem is reported to exist due to improper sanitizing of user-supplied data in certain URI parameters passed to the default.php script. This vulnerability makes it possible for an attacker to construct a malicious link containing HTML or script code that may be rendered in a user's browser upon visiting that link.

The mvdsv Quake Server implementation is prone to a remotely exploitable buffer overrun vulnerability

The mvdsv Quake Server implementation is prone to a remotely exploitable buffer overrun vulnerability. This vulnerability is caused by a lack of bounds checking when processing certain packets. An attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable server. This could permit execution of arbitrary code in the context of the server.

X-Chat Remote Denial of Service Vulnerability

It has been reported that X-Chat may be prone to a remote denial of service vulnerability that may allow an attacker to crash the client by sending a malicious 'DDC SEND' request. X-Chat version 2.0.6 running on a Linux platform has been reported to be affected by this issue resulting in a crash. Although unconfirmed, it is possible that other versions are affected as well. This issue is similar to mIRC DCC SEND Buffer Overflow Vulnerability.

Recent Exploits: