header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

KingView Log File Parsing Buffer Overflow

This module exploits a vulnerability found in KingView <= 6.55. It exists in the KingMess.exe application when handling log files, due to the insecure usage of sprintf. This module uses a malformed .kvl file which must be opened by the victim via the KingMess.exe application, through the 'Browse Log Files' option. The module has been tested successfully on KingView 6.52 and KingView 6.53 Free Trial over Windows XP SP3.

Mitsubishi MX Component v3 ActiveX 365+-Day [ActUWzd.dll (WzTitle)]

This exploit affects the Mitsubishi MX Component v3 ActiveX control, specifically the ActUWzd.dll file with version 1.0.0.1. It is known to be present in CitectScada 7.10r1 and CitectFacilities 7.10. Other vendors may also ship/support this component. Any control in this library with type 'String' is vulnerable.

Sami FTP Server LIST Command Buffer Overflow

This module exploits a stack based buffer overflow on Sami FTP Server 2.0.1. The vulnerability exists in the processing of LIST commands. In order to trigger the vulnerability, the "Log" tab must be viewed in the Sami FTP Server managing application, in the target machine. On the other hand, the source IP address used to connect with the FTP Server is needed. If the user can't provide it, the module will try to resolve it. This module has been tested successfully on Sami FTP Server 2.0.1 over Windows XP SP3.

WordPress IndiaNIC FAQ 1.0 Plugin Blind SQL Injection

The 'order' and 'orderby' parameter in the IndiaNIC FAQ 1.0 Plugin for WordPress is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL code into the 'order' or 'orderby' parameter.

WordPress IndiaNIC FAQ 1.0 Plugin CSRF + XSS

IndiaNIC FAQ Settings Page is vulnerable for CSRF. The Ask Question area (front-end) is vulnerable for XSS. It is possible to insert <script>alert(1)</script> in question parameter. The Captcha value can be read from captcha parameter (hidden field).

NapShare Remote Buffer Overflow Vulnerability

NapShare is susceptible to a remote buffer overflow vulnerability due to a failure of the application to properly bounds check user-supplied data prior to copying it to a fixed-size memory buffer. Attackers running malicious Gnutella servers can exploit this vulnerability to execute arbitrary code in the context of the vulnerable application. Version 1.2 of NapShare is reported susceptible.

Multiple vulnerabilities in PHP4 and PHP5

PHP4 and PHP5 are reported prone to multiple local and remote vulnerabilities that may lead to code execution within the context of the vulnerable process. The vulnerabilities include a heap-based buffer overflow in the 'pack()' function, a heap-based memory disclosure in the 'unpack()' function, an access control bypass in 'safe_mode_exec_dir', an access control bypass in 'safe_mode', a 'realpath()' path truncation vulnerability, and a memory corruption vulnerability in the 'unserialize()' function.

PHP4 and PHP5 Multiple Vulnerabilities

PHP4 and PHP5 are prone to multiple local and remote vulnerabilities that may lead to code execution within the context of the vulnerable process. The vulnerabilities include a heap-based buffer overflow in the 'pack()' function, a heap-based memory disclosure in the 'unpack()' function, an access control bypass vulnerability in 'safe_mode_exec_dir', an access control bypass vulnerability in 'safe_mode', a 'realpath()' path truncation vulnerability, and a memory corruption vulnerability in the 'unserialize()' function.

Remote Buffer Overflow in MPlayer

A remote, client-side buffer overflow vulnerability affects MPlayer. This issue is due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into static process buffers. An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.

Recent Exploits: