header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Systrace Privilege Escalation Vulnerability

The vulnerability allows a local attacker to gain root privileges on a vulnerable system by exploiting insufficient access validation in Systrace on NetBSD and the FreeBSD port by Vladimir Kotal. The attacker can use a specially crafted payload to restore privileges and execute arbitrary code.

XML Parsing Denial of Service Vulnerability in Internet Explorer

Internet Explorer is affected by a XML parsing denial of service vulnerability. The vulnerability occurs due to a failure of the application to properly handle malformed XML tags. An attacker can exploit this vulnerability to crash a vulnerable web browser.

Arbitrary Command Execution in Open WebMail

A vulnerability in Open WebMail allows a remote attacker to execute arbitrary commands on a vulnerable host. The issue is caused by insufficient sanitization of shell metacharacters passed through URI parameters. By exploiting this vulnerability, a non-privileged user can remotely execute arbitrary commands in the context of the web server hosting the vulnerable application.

Squid Proxy Internet Access Control Bypass Vulnerability

Squid proxy is affected by an Internet access control bypass vulnerability. The issue arises due to the failure of the application to handle access controls properly when evaluating malformed URI requests. This vulnerability allows users who are restricted from accessing Internet-based resources to access arbitrary websites.

Tutorials Manager Multiple SQL Injection Vulnerabilities

The Tutorials Manager application is affected by multiple SQL injection vulnerabilities due to a failure to properly sanitize user-supplied input. These vulnerabilities allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information or corruption of database data. In addition, SQL injection attacks may be used to exploit latent vulnerabilities in the underlying database implementation.

Remote Heap Buffer Overflow in MailEnable

The 'Professional' and 'Enterprise' editions of MailEnable are prone to a remote heap buffer overflow. The overflow allows the attacker to control the EAX and ECX registers, allowing arbitrary code execution as SYSTEM. If logging is enabled, the request could contain: GET /{4032 x A} HTTP/1.1 or, without logging: GET /{8501 x A} HTTP/1.1.

Multiple Input Validation Vulnerabilities in NukeJokes Module

The NukeJokes module is affected by multiple input validation vulnerabilities. These include multiple SQL injection issues and multiple cross-site scripting vulnerabilities. The vulnerabilities arise due to a failure to properly sanitize user-supplied input, allowing remote attackers to manipulate query logic and potentially gain unauthorized access to sensitive information or execute malicious scripts in the context of the victim user's browser.

Recent Exploits: