header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Avaya IP Office (IPO) v9.1.0 – 10.1 SoftConsole Remote Buffer Overflow 0day

SoftConsole.exe does not check bounds when reading server response on making an outbound connection, resulting in a classic Buffer Overflow exploit. Avaya IP Office user must connect to a malicious server where a remote attacker can then deliver the buffer overflow payload in the server response, exploiting the SoftConsole client. This vulnerability allows attackers to deliver and execute arbitrary attacker supplied code on the Avaya host system.

Remote un-authenticated DoS in Debut embedded httpd server in Brother printers

The Debut embedded http server contains a remotely exploitable denial of service where a single malformed HTTP POST request can cause the server to hang until eventually replying with an HTTP 500 error. While the server is hung, print jobs over the network are blocked and the web interface is inaccessible. An attacker can continuously send this malformed request to keep the device inaccessible to legitimate traffic.

Actiontec C1000A backdoor account

The Actiontec C1000A Modem provided by CenturyLink has hardcoded passwords. This is similar to another recent submission by Matthew Shiemo, who inspired me to check the device I use. Proof of Concept: telnet 192.168.0.1 and login with admin/CenturyL1nk.

Jnes Version 1.0.2 Stack Buffer Overflow

Jnes Version 1.0.2 is vulnerable to a stack buffer overflow vulnerability. An attacker can exploit this vulnerability by loading a malicious ROM file and then going to the options - cheats - add - Pro-Action Replay menu. The attacker can then paste the contents of the open.txt file in the box <address>-<value> and click on ok. This will cause a buffer overflow and allow the attacker to execute arbitrary code on the vulnerable system.

Ipswitch WS_FTP Professional Local Buffer Overflow (SEH)

A buffer overflow vulnerability exists in Ipswitch WS_FTP Professional version 12.6.03. An attacker can exploit this vulnerability by sending a specially crafted payload to the search field, which can be used to overwrite the SEH and execute arbitrary code. The payload can be generated using a script, and the shellcode can be replaced with 'Ds' in the search field.

Advisory: XML External Entity Expansion in Ladon Webservice

Attackers who can send SOAP messages to a Ladon webservice via the HTTP interface of the Ladon webservice can exploit an XML external entity expansion vulnerability and read local files, forge server side requests or overload the service with exponentially growing memory payloads.

tnftp “savefile” Arbitrary Command Execution

This module exploits an arbitrary command execution vulnerability in tnftp's handling of the resolved output filename - called "savefile" in the source - from a requested resource. If tnftp is executed without the -o command-line option, it will resolve the output filename from the last component of the requested resource. If the output filename begins with a "|" character, tnftp will pass the fetched resource's output to the command directly following the "|" character through the use of the popen() function.

Recent Exploits: