header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

raptor_libnspr3 – Solaris 10 libnspr constructor exploit

Local exploitation of a design error vulnerability in version 4.6.1 of NSPR, as included with Sun Microsystems Solaris 10, allows attackers to create or overwrite arbitrary files on the system. The problem exists because environment variables are used to create log files. Even when the program is setuid, users can specify a log file that will be created with elevated privileges (CVE-2006-4842).

Cisco VPN Concentrator 3000 FTP remote exploit

A vulnerability exists in the Cisco VPN Concentrator 3000, an unauthenticated user may access the file system through manipulation of FTP service commands. An unauthenticated user can use the following commands; CWD, MKD, CDUP, RNFR, SIZE, RMD. The FTP service remembers the current working directory so directory changes can affect exploitation. By removing potentially sensitive directories such as 'CERTS' it may be possible to disrupt service to a VPN.

prdelka-vs-AEP-smartgate

A vulnerability exists in the smartgate SSL server (listens on port 443 by default) which may allow a malicious user to download arbitrary files with the priviledges of the smartgate server. By analyzing the returned HTTP header response, an attacker can also test for the existance of a remote directory. Remote directories return a "Moved Permanently" error, as opposed to a 404.

HP-UX libc timezone environment overflow exploit

HP-UX libc contains an exploitable stack overflow in the handling of 'TZ' environment variable. The problem occurs due to insufficient bounds checking in the localtime_r() and related functions. Any suid or sgid program which uses the timezone functions can be used as an attack vector. This exploit uses 'su' to obtain root priviledges.

HP-UX swmodify buffer overflow exploit

HP-UX 'swmodify' contains an exploitable stack overflow in the handling of command line arguements. Specifically the problem occurs due to insufficent bounds checking in the '-S' optional arguement. 'swmodify' is installed setuid root by default in HP-UX and allows for local root compromise when exploiting this issue.

HP-UX swpackage buffer overflow exploit

HP-UX 'swpackage' contains an exploitable stack overflow in the handling of command line arguements. Specifically the problem occurs due to insufficent bounds checking in the '-S' optional arguement. 'swpackage' is installed setuid root by default in HP-UX and allows for local root compromise when exploiting this issue.

Recent Exploits: