header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TFS Gateway 4.0 Denial of Service

TFS Gateway 4.0, when configured in a specific non-default manner, is vulnerable to a remotely exploitable denial of service attack. If 'return entire message to sender' is enabled for failed send attempts, and an email is sent to the TFS Gateway with 1: the From: address set to an invalid address on a remote machine and 2: an invalid To: address on the target machine, the gateway will attempt to return the complete message once every 10 seconds until an administrator manually stops it. If enough emails of sufficient size of this nature are sent it can lead to a degradation or denial of service.

Vixie cron Buffer Overflow

The version of Vixie cron that ships with RedHat versions 4.2, 5.2 and 6.0 is vulnerable to a local buffer overflow attack. By utilizing the MAILTO environment variable, a buffer can be overflown in the cron_popen() function, allowing an attacker to execute arbitrary code. Vixie cron daemon is installed setuid root by default, allowing for a local root compromise.

Ircd hybrid-6 (up to beta 58) Remote Access Vulnerability

Ircd hybrid-6 (up to beta 58) has a vulnerability which can allow remote access to the irc server (ircd). In most cases this attack results in the attacker gaining the privileges of the user 'irc'. This vulnerability is in the invite handling code (m_invite). In a channel with operators (ops) and modes +pi (paranoid + invite-only), a channel invitation is reported to all other operators. The buffer used to store the invitation notice can be overflown by up to 15 bytes.

MacOS Password Decryption Vulnerability

The encryption algorithm in MacOS system is simple and the password can be easily decoded. Password is stored in Users & Groups Data File in Preferences folder. Offset is different on each system and depends on Users & Groups configuration, but it always lie after owner's username. It's not so difficult to find it using a hex editor, even if we don't know owner's username. An example of the decryption process is given in the text. Dawid adix Adamski wrote an apple script to break passwords.

Buffer Overflow in IMail ldap service

The IMail ldap service has an unchecked buffer, resulting in a classic buffer overflow vulnerability. An attacker can exploit this vulnerability by telnetting to the target machine on port 389 and sending a string of 2375 characters followed by the letter 'Y' twice. This will cause the ldap service to consume 90% of the system resources, rendering the system unusable.

xfsdump Program Vulnerability

The xfsdump program shipped with Irix 5.x and 6.x from SGI contains a vulnerability which could lead to root compromise. By creating a log file in /usr/tmp called bck.log, a user could create a symbolic link from this file to any file they wish to be created as root. This is turn could be used to compromise the system.

IRIX 5.x and 6.x Systour and OutOfBox Subsystems Privilege Escalation

A vulnerability exists in both the Systour and OutOfBox subsystems included with new installs of IRIX 5.x and 6.x from SGI. This vulnerability allows users on the system to run arbitrary commands as root. An attacker can exploit this vulnerability by creating a malicious .exitops file in the $HOME/var/inst directory and then running the RemoveSystemTour command. This will execute the malicious .exitops file as root, allowing the attacker to gain root privileges.

IBM SP2 SDR Daemon Arbitrary File Retrieval Vulnerability

The System Data Repository (SDR) subsystem in IBM SP multi-machine parallel processing environments is vulnerable to an arbitrary file retrieval attack. The SDR daemon 'sdrd' does not properly authenticate users, allowing unauthenticated users to pull any file off SDR hosts.

Recent Exploits: