header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IkonBoard 3.1.1 Remote Command Execution Vulnerability

It has been reported that IkonBoard is prone to an arbitrary command execution vulnerability. The vulnerability is due to insufficient sanitization performed on user supplied cookie data. An attacker may exploit this issue to execute arbitrary commands in the security context of the web server hosting the vulnerable IkonBoard.

Samba v2.2.x call_trans2open() Remote Overrun exploit for XxxxBSD

A buffer overflow vulnerability has been reported for Samba. The problem occurs when copying user-supplied data into a static buffer. By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory. Successful exploitation of this issue could allow an attacker to execute arbitrary commands, with the privileges of the Samba process.

EZ Server Buffer Overflow Vulnerability

The EZ Server software is vulnerable to a buffer overflow attack when it receives strings of excessive length. This can be exploited by sending a string of A characters with a length of 1993 or 1994 to the ls or cd command respectively. This will cause the server to crash, denying service to legitimate users.

Monkey HTTP Daemon Boundary Condition Error

Monkey HTTP Daemon is prone to a boundary condition error. This condition occurs when the server attempts to handle excessive HTTP POST data. Exploitation could allow a remote attacker to corrupt sensitive regions of memory with attacker-supplied values, resulting in code execution. Exploitation attempts may also result in a denial of service.

Advanced Poll Information Disclosure Vulnerability

Advanced Poll is vulnerable to an information disclosure vulnerability. A remote user can access privileged information by accessing the info.php files located in the poll_dir/db/ and poll_dir/textfile/ directories. This information can be used to further attack the host and its users.

Simple Chat! Information Disclosure Vulnerability

Simple Chat! is a web-based chat application that does not restrict access to sensitive information by default. An attacker can exploit this vulnerability by accessing the usr.dat file located in the chat/data directory, which contains sensitive information such as usernames and passwords.

Samba <= 2.2.7a reply_nttrans() Linux x86 Remote Root Exploit

Samba is prone to a buffer-overflow vulnerability when the 'service tries to reassemble specially crafted SMB/CIFS packets. An attacker can exploit this vulnerability by creating a specially formatted SMB/CIFS packet and sending it to a vulnerable Samba server. The overflow condition will be triggered and will cause smbd to overwrite sensitive areas of memory with attacker-supplied values.

A vulnerability has been reported for VPOPMail

VPOPMail is vulnerable to command injection due to insufficient sanitization of user-supplied input. An attacker can manipulate URI parameters to include malicious system commands, which will be executed with the privileges of the web server process.

file(1) exploit for *bsd,linux

It has been reported that a stack overflow exists in the file program. It is likely that this issue could be exploited to execute code as the user invoking file. The exploit code does cp /bin/sh /tmp/.sh;chmod 4755 /tmp/.sh and also echos the correct filename followed by ': data'. This exploit works without silly targets or offsets.

Recent Exploits: