header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

JE Messenger 1.0 Arbitrary File Upload Vulnerability

A logic error in the save function (compose.php) allows to a registered user to upload a file with any extension. The check for a valid file's extension is made after the upload and in the failure case, the file doesn't removed from the server. This can be exploited to execute arbitrary PHP code by uploading a PHP file.

XSRF/CSRF in CMScout

The vulnerability exists due to failure in the "admin.php" script to properly verify the source of HTTP request. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. Attacker can use browser to exploit this vulnerability. The following PoC is available: <form action="http://host/admin.php?page=users&subpage=usergroups&subpage=usergroups&action=add&uid=USER_ID" method="post" name="main" ><input type="hidden" name="gid" value="1"><input type="hidden" name="utype" value="2"><input type="hidden" name="action" value="Add"></form><script>document.main.submit();</script>

JE Auto 1.0 SQL Injection Vulnerability

A parameter is not properly sanitised before being used in a SQL query. Input passed to 'char' parameter is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that magic_quotes_gpc is set to Off.

Buffer Overflow in Wonderware InBatch

The lm_tcp service listens (manually or automatically during the launching of 'Environment Display/Manager') on port 9001 and is vulnerable to a buffer overflow during the copying of a string in a buffer of 150 bytes which is part of a fixed structure. The overflow (max 19204 chars) allows only to overwrite the two memory pointers located after the space assigned to the copying of the string and they are immediately used for two memset(buffer, 0, 2) operations with the consequent effect of writing a 16bit 0x0000 in an arbitrary memory location.

Winamp 5.6 Arbitrary Code Execution in MIDI Parser

When Winamp plays MUS files and other MIDI variants, it begins by converting them to a canonical format. Timestamps in MIDI files are encoded by serializing 32 bit integers into 1, 2, 3, 4 or 5 bytes, storing 7 data bits in each byte. The last bit is used to indicate whether or not a given byte is the last. The serialization is done into an 8 byte buffer, which should be large enough, but there is a logic bug in the code which allows an attacker to write one byte outside of the buffer. The serialization is done by shifting the input value multiples of seven bits, until there is no more bits set. This is done using the x86 instruction SAR. Unfortunately this instruction does not clear the register when shifting more than the register width, but instead shifts the requested amount modulo the register width. By crafting an input file so that Winamp tries to serialize a value which has the most significant bit cleared and one of the following three bits set, an attacker can force the program to write the value shifted 0, 7, 14, 21, 28, 3, 10, 17 and 24 bits; a total of nine output bytes. The least significant value overflows into the saved base pointer.

GNU inetutils 1.8-1 ftp client Heap Overflow

GNU inetutils ftp (shipped with linux and other *nix's) suffers a heap overflow while parsing command arguments (but ONLY when the argument is NOT passed on the same line.) If you run any command (open, user, cd, mkdir, etc) without an argument, ftp will prompt you for an argument with readline(). It will then copy this input into a 200 byte buffer without first checking it's length.

Recent Exploits: