header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Exploit Buffer Overflow MP3-Nator

Exploit Buffer Overflow MP3-Nator is a vulnerability in MP3-Nator version 2.0 which allows an attacker to execute arbitrary code by overflowing a buffer. The exploit is triggered when a specially crafted .plf file is opened. The attacker can then execute arbitrary code on the vulnerable system.

Landesk OS command injection

The LANDesk division of Avocent Corporation provides systems management, security management, service desk, asset management, and process management solutions to organizations. The company's software is used worldwide. A security vulnerability was discovered in LANDesk Management Suite: The Landesk web application does not sufficiently verify if a well-formed request was provided by the user who submitted the request. Using this information an external remote attacker can run arbitrary code using the gsbadmin user (that is the user running the web-server). In order to be able to successfully make the attack, the administrator must be logged in to the appliance with the browser that the attacker uses to make the attack (for instance, exploiting a XSS in a different tab in the browser).

eBlog 1.7 Multiple SQL Injection Vulnerabilities

Input passed to 'id', 'keywords' and to some parameters sent via POST method, is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation, only in some cases, requires that magic_quotes_gpc is set to Off.

FCKeditor 2.0-2.4.3 arbitrary file upload

FCKeditor is a popular open source WYSIWYG HTML editor used by many websites. A vulnerability exists in versions 2.0-2.4.3 which allows an attacker to upload arbitrary files to the server. For versions 2.0-2.2, an attacker can send any text that is not contained in (File, Flash, Image) as the Type parameter and then upload a file with any extension. For versions 2.3.0-2.4.3, an attacker can send Type=Media and upload any file as the Media parameter is not defined in the config.php file.

Free CD to MP3 Converter 3.1 Buffer Overflow Exploit (SEH)

Free CD to MP3 Converter 3.1 is vulnerable to a buffer overflow exploit. The vulnerability is triggered when a specially crafted WAV file is opened. This exploit uses a SEH overwrite to execute arbitrary code. The exploit code contains a shellcode that will launch calc.exe when executed.

Remote Buffer Overflow Qtweb Browser 3.5

A remote buffer overflow vulnerability exists in Qtweb Browser 3.5. By sending a specially crafted request, an attacker can cause a buffer overflow, resulting in a denial of service or the execution of arbitrary code. The vulnerability is due to insufficient bounds checking when processing a maliciously crafted request. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.

Linux Kernel Uninitialized Bytes Read Vulnerability

This exploit allows an attacker to read uninitialized bytes of the kernel stack, which can contain sensitive information. The exploit is accomplished by creating two sockets, attaching a filter to the first socket, and then transferring data between the two sockets. The filter is designed to only allow certain packets to pass through, which allows the attacker to read the uninitialized bytes of the kernel stack.

Crawler endless loop (CVE-2010-3899)

The crawler has no recursion depth limit. A site with dynamic parameter manipulation can cause an endless loop. This loop will block the crawler thread and use permanent server resources. Too many blocks can lead to a denial of service. The same site will be indexed more times and the search results will display the same site many times. This can be abused for spamming the search results. Exploit to test the endless loop: /* loop.php */ <?php $numb = rand(); echo $numb.'<br><a href="loop.php?value='.$numb.'">click me</a>'; ?>

Privilege escalation in two applications (CVE-2010-3895)

Root SUID bits are set for the applications »esRunCommand« and »estaskwrapper«. esRunCommand takes one argument and runs it as root. The application »estaskwrapper« is meant to start the application »estasklight«. If the user has the environment variable »ES_LIBRARY_PATH« set, the value is copied to two new environment variables »LD_LIBRARY_PATH« and »LIBPATH«. If the »auth« flag is set, the application »estasklight« is executed. An exploit for running /bin/sh is to copy /bin/sh to ~/bin/estasklight, set the environment variable ES_LIBRARRY_PATH to ~/bin and run /opt/IBM/es/bin/estaskwrapper estasklight.

Recent Exploits: