The Convex 3D application is susceptible to a stack-based buffer overflow vulnerability. This vulnerability occurs due to a failure in checking the bounds of user-supplied image data before copying it into a fixed-size memory buffer. Remote attackers can exploit this vulnerability to alter the flow of execution of the application, potentially leading to the execution of attacker-supplied machine code within the context of the application.
rtf2latex2e is susceptible to a stack buffer overflow vulnerability. This issue occurs when the application fails to properly bounds check user-supplied image data before copying it into a fixed-size memory buffer. Remote attackers can exploit this vulnerability to alter the flow of execution, potentially executing attacker-supplied machine code in the context of the application when reading a malicious RTF file.
NASM is prone to a buffer overflow. This condition is exposed when the application attempts to assemble a source file that contains malformed '%error' preprocessor directive arguments. Since the source file may originate from an external or untrusted source, this vulnerability is considered remote in nature. Successful exploitation will permit arbitrary code execution with the privileges of the user running the application.
QwikMail (qwik-smtpd) is prone to a remotely exploitable buffer overflow vulnerability due to insufficient bounds checking of client-supplied SMTP HELO request data. This issue could be exploited to execute arbitrary code and potentially allow a remote attacker to abuse the server as an unauthorized mail relay.
This is a proof of concept for an ARP overflow vulnerability. The exploit code is designed to run shellcode written by Cheez Whiz. It has been tested on x86 Solaris 7 and 8 beta. The default settings should work, but if not, the offset can be adjusted by providing a command line argument.
The SSH_BRUTE tool is a remote users discovery tool that exploits a vulnerability in OpenSSH/PAM <= 3.6.1p1. It allows an attacker to test for the existence of valid user accounts on a target system by brute-forcing the authentication process. By sending multiple authentication requests with an illegal user and measuring the response time, the tool can determine if the user account exists. This can be used to gather information for further attacks or to identify potential targets for password guessing attacks.
This exploit takes advantage of a buffer overflow vulnerability in Windows Light HTTPD v0.1. By sending a specially crafted HTTP GET request, an attacker can overflow the buffer and execute arbitrary code on the target system. The exploit uses a payload that spawns a shell bind TCP connection on port 1337. The vulnerability was discovered and reported by Jacob Holcomb/Gimppy042 on 24th April, 2013. The affected software can be downloaded from the software vendor's website at http://sourceforge.net/projects/lhttpd/?source=navbar. More information about the exploit can be found in the advisory at http://infosec42.blogspot.com/.
A remote, client-side buffer overflow vulnerability reportedly affects the DXFscope utility. This issue is due to a failure of the application to properly sanitize user-supplied input prior to using it as the format specifier string in a formatted printing function. An attacker may leverage this issue to execute arbitrary code with the privileges on an unsuspecting user that uses the vulnerable application to process a malicious DXF formatted file. This may facilitate unauthorized access or privilege escalation.
The vulnerability allows a remote attacker to upload arbitrary PHP scripts to a vulnerable server due to insufficient sanitization of user-supplied input. If successful, the attacker can execute arbitrary script code on the server, leading to unauthorized access in the context of the application.
WordPress is vulnerable to multiple cross-site scripting, HTML injection, and SQL injection vulnerabilities. These vulnerabilities arise due to a lack of proper sanitization of user-supplied data. The cross-site scripting and HTML injection vulnerabilities allow remote attackers to create malicious URI links or post data that includes hostile HTML and script code. If the victim user follows the malicious link or views resulting pages, the hostile code may be rendered in their web browser, potentially leading to the theft of authentication credentials or other attacks. The SQL injection vulnerabilities can be exploited to manipulate SQL queries and may result in the theft of sensitive information and data corruption.