header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Buffer Overflow in DeleGate SSLway Filter

A remote buffer overflow vulnerability has been reported to affect the DeleGate SSLway filter. This filter is employed when DeleGate is applying SSL to arbitrary protocols. The issue presents itself due to a lack of sufficient boundary checks performed, when copying user-supplied certificate field contents. A remote attacker may potentially exploit this issue, to overwrite the return address of the static ssl_prcert() function. The attacker may corrupt any other saved value that is within 768 bytes from the end of the affected buffers. It has been reported that the X509_NAME_oneline() function will perform character conversion on characters below '0x20' or above '0x7e'; this may hinder exploitation of this issue.

SurgeLDAP Web Administration Authentication Bypass Vulnerability

The SurgeLDAP web administration application is prone to an authentication bypass vulnerability, possibly allowing remote attackers manager access. Once administration access is granted, it may be possible for an attacker to modify records in the LDAP database, destroy data, crash the server, or possibly further attacks on other services utilizing SurgeLDAP for its authentication data.

Exim Stack-Based Buffer Overrun Vulnerability

Exim has a remotely exploitable stack-based buffer overrun vulnerability. This vulnerability can be triggered by a malicious email if sender verification is enabled in the agent. It allows for the execution of arbitrary code in the content of the mail transfer agent. The vulnerable functionality is not enabled by default, but may be enabled in some Linux/Unix distributions that ship the software.

PHPX Multiple Administrator Command Execution Vulnerabilities

PHPX is affected by multiple administrator command execution vulnerabilities. These issues allow a remote attacker to create a malicious URI link or embed a malicious URI between bbCode image tags, leading to the execution of attacker-supplied commands with administrator privileges.

phlyLabs phlyMail Lite 4.03.04 Path Disclosure and Stored XSS Vulnerabilities

phlyMail suffers from multiple stored XSS vulnerabilities (post-auth) and Path Disclosure when input passed via several parameters to several scripts is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site and displaying the full webapp installation path.

CVE-2012-6096 – Nagios history.cgi Remote Command Execution

This exploit targets the Nagios CGI script history.cgi. It takes advantage of a vulnerability in the Nagios code to execute remote commands. The exploit is likely to work on other Linux distributions that have similar vulnerabilities. The code includes some questionable practices that may not be recommended by experienced exploit coders.

Multiple Cross-Site Scripting Vulnerabilities in PHPX

PHPX is affected by multiple cross-site scripting vulnerabilities. These vulnerabilities occur due to a failure of the application to properly sanitize user-supplied URI input. An attacker can create a malicious URI link that includes hostile HTML and script code. When the victim user follows this link, the hostile code may be rendered in their web browser. This can lead to theft of cookie-based authentication credentials or other attacks.

HTML Injection Vulnerability in Simple Machines Forum (SMF)

The vulnerability allows an attacker to execute arbitrary HTML or script code in a user's browser by injecting malicious content via the font size attribute. This can lead to theft of cookie-based authentication credentials and other potential attacks.

Recent Exploits: