header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

BBS E-Market Professional Multiple File Disclosure Vulnerabilities

BBS E-Market Professional is reported prone to multiple file disclosure vulnerabilities. These issues exist due to insufficient sanitization of user-supplied data. A remote attacker can disclose arbitrary Web-readable files by supplying directory traversal sequences such as '../' to the server. This results in improper access to potentially sensitive files located outside of the document root of the web server.

Remote Directory Traversal Vulnerability in MyServer

MyServer is prone to a remote directory traversal vulnerability. This issue occurs due to insufficient sanitization of user-supplied data, allowing improper access to potentially sensitive files located outside of the web server's document root.

Remote Heap Overflow in Mozilla

Mozilla is prone to a remotely exploitable heap overflow that is exposed when the browser handles non-ASCII characters in URIs. This issue could be exploited by enticing a user to open a hyperlink that references a malicious URI. Successful exploitation will allow execution of arbitrary code in the context of the client user.

Multiple Buffer Overflow Vulnerabilities in QNX Photon MicroGUI

QNX Photon MicroGUI is affected by multiple buffer overflow vulnerabilities in MicroGUI utilities. These issues are due to a failure of the affected applications to validate user-supplied string lengths before copying them into finite process buffers. An attacker may leverage these issues to execute arbitrary code on the affected system within the context of the vulnerable applications; the applications are typically setuid applications.

Pingtel Xpressa Handsets Remote Denial of Service Vulnerability

Pingtel Xpressa handsets are prone to a remote denial of service vulnerability due to a lack of sufficient boundary checks performed on HTTP request data handled by the Xpressa administration web server. A remote attacker can exploit this vulnerability to effectively deny service to the affected handset and potentially execute arbitrary code.

PerlDesk server-side script execution vulnerability

The vulnerability allows an attacker to execute the contents of Perl scripts on the affected server's filesystem. This can be done by manipulating the 'lang' parameter in the pdesk.cgi script. The execution occurs within the context of the affected CGI application with the privileges of the web server process. If the attacker does not have direct access to the server, they can still exploit the vulnerability to gather sensitive information through error messages. Additionally, the attacker can leverage the vulnerability to execute other preexisting scripts on the system, potentially aiding them in further attacks.

Recent Exploits: