0.0004EPSS
-0.1AI Score
HP Deskjet 6800 XSS in Web Interface
A Cross-site scripting input validation error has been identified in the web interface of the HP Deskjet 6800 printer family. By sending a string such as <script>alert("found XSS on this page")</script> via a POST request to /refresh_rate.htm the resulting error page will execute the sc...
1.8AI Score
0.8AI Score
XBMC 8.10 (GET Requests) Multiple Remote Buffer Overflow PoC
Exploit for multiple platform in category dos /...
7.1AI Score
TightVNC ClientConnection Multiple Integer Overflow Vulnerabilities (Windows)
This host is running TightVNC and is prone to Multiple Integer Overflow...
1.3AI Score
0.899EPSS
UltraVNC ClientConnection Multiple Integer Overflow Vulnerabilities (Windows)
This host is running UltraVNC and is prone to Multiple Integer Overflow...
1.2AI Score
0.899EPSS
BUGTRAQ ID: 33777 FreeBSD就是一种运行在Intel平台上、可以自由使用的开放源码Unix类系统。 telnet协议允许传送telnet通讯中的环境变量并分配给tcp连接的另一端。FreeBSD的telnet守护程序在执行/bin/login之前没有检查LD_* (如LD_PRELOAD)环境变量,因此攻击者可以在传送的环境变量中包含LD_PRELOAD标识和文件系统上带有恶意代码的预编译库值。在以用户id和组id 0(root)执行/bin/login时,就会通过telnet环境定义预加载远程连接所设置的库并执行。...
7.5AI Score
-0.4AI Score
0.113EPSS
7.6AI Score
0.113EPSS
7.4AI Score
SQL injection vulnerability in the Wir ber uns [sic] (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified...
8.4AI Score
0.001EPSS
SQL injection vulnerability in the Wir ber uns [sic] (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified...
9.1AI Score
0.001EPSS
SQL injection vulnerability in the Wir ber uns [sic] (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified...
8.4AI Score
0.001EPSS
SQL injection vulnerability in the Wir ber uns [sic] (fsmi_people) extension 0.0.24 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified...
8.4AI Score
0.001EPSS
freeSSHd SFTP 'rename' and 'realpath' Remote DoS Vulnerability
The host is running freeSSHd SSH server and is prone to remote denial of service vulnerability. NULL pointer de-referencing errors in SFTP 'rename' and 'realpath' commands. These can be exploited by passing overly long string passed as an argument to the affected...
0.9AI Score
0.076EPSS
freeSSHd SFTP 'rename' and 'realpath' Remote DoS Vulnerability
freeSSHd SSH server is prone to a remote denial of service vulnerability. NULL pointer de-referencing errors in...
6.7AI Score
0.076EPSS
RealVNC VNC Viewer Remote Code Execution Vulnerability (Windows)
This host has RealVNC VNC Viewer installed and is prone to security vulnerability. The flaw is due to error in 'CMsgReader::readRect()' function in common/rfb/CMsgReader.cxx processing encoding types, and is exploited by sending specially crafted messages to the...
1AI Score
0.076EPSS
Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath...
7.7AI Score
0.076EPSS
Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath...
7.7AI Score
0.076EPSS
Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath...
8.3AI Score
0.076EPSS
Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath...
7.7AI Score
0.076EPSS
freeSSHd (stf - rename) Buffer Overflow Vulnerability
freeSSHd (rename) Buffer Overflow Vulnerability http://www.milw0rm.com/exploits/6800 <-- Same vuln just further research Registers EAX 00000000 ECX 41414141 EDX 7C9037D8 ntdll.7C9037D8 EBX 00000000 ESP 001376BC EBP 001376DC ESI 00000000 EDI 00000000 EIP 41414141 <-- Pwned Part of the string i...
0.2AI Score
-0.2AI Score
BEA Weblogic Transfer-Encoding Buffer Overflow
This module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. This vulnerability exists in the error reporting for unknown Transfer-Encoding headers. You may have to run this twice due to timing issues with...
0.9AI Score
7.4AI Score
EPSS
Acoustica Beatcraft 1.02 Build 19 (bcproj file) Local BOF Exploit
Exploit for unknown platform in category local...
6.8AI Score
Fedora 8 : fetchmail-6.3.8-4.fc8 (2008-5800)
http://fetchmail.berlios.de/fetchmail-SA-2008-01.txt Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional...
-0.3AI Score
0.113EPSS
7.4AI Score
EPSS
WinVNC Web Server GET Overflow
This module exploits a buffer overflow in the AT&T; WinVNC version <= v3.3.3r7 web server. When debugging mode with logging is enabled (non-default), an overly long GET request can overwrite the stack. This exploit does not work well with VNC...
7.9AI Score
[SECURITY] [DSA 1578-1] New php4 packages fix several vulnerabilities
Debian Security Advisory DSA-1578-1 [email protected] http://www.debian.org/security/ Thijs Kinkhorst May 17, 2008 http://www.debian.org/security/faq Package : php4 Vulnerability : several Problem type : local/remote...
7.5AI Score
0.412EPSS
[Full-disclosure] Canon Multi Function Devices vulnerable to FTP bounce attack
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Indiana University Security Advisory: Canon Multi Function Devices vulnerable to FTP bounce attack. Advisory ID: 20080229 Canon MFD FTP bounce attack Advisory revisions: * 02-29-2008 0500 UTC 1.0 Initial Public Release Credit/acknowledgement:...
1.4AI Score
0.017EPSS
7.1AI Score
Unfixed XSS vulnerability at www.turksecurity.org
Security researcher hypn0sis, has submitted on 11/04/2007 a cross-site-scripting (XSS) vulnerability affecting www.turksecurity.org, which at the time of submission ranked 5212670 on the web according to Alexa. We manually validated and published a mirror of this vulnerability on 11/04/2007. It is....
-0.1AI Score
Immunity Canvas: WPBACKUP_INCLUDE
Name| wpbackup_include ---|--- CVE| CVE-2007-5800 Exploit Pack| CANVAS Description| WordPress plugin BackUpWordPress <= 0.4.2b Remote File Inclusion Notes| CVE Name: CVE-2007-5800 VENDOR: WordPress Repeatability: Infinite References:...
1AI Score
0.114EPSS
Multiple PHP remote file inclusion vulnerabilities in the BackUpWordPress 0.4.2b and earlier plugin for WordPress allow remote attackers to execute arbitrary PHP code via a URL in the bkpwp_plugin_path parameter to (1) plugins/BackUp/Archive.php; and (2) Predicate.php, (3) Writer.php, (4)...
7.8AI Score
0.114EPSS
Multiple PHP remote file inclusion vulnerabilities in the BackUpWordPress 0.4.2b and earlier plugin for WordPress allow remote attackers to execute arbitrary PHP code via a URL in the bkpwp_plugin_path parameter to (1) plugins/BackUp/Archive.php; and (2) Predicate.php, (3) Writer.php, (4)...
7.8AI Score
0.114EPSS
Multiple PHP remote file inclusion vulnerabilities in the BackUpWordPress 0.4.2b and earlier plugin for WordPress allow remote attackers to execute arbitrary PHP code via a URL in the bkpwp_plugin_path parameter to (1) plugins/BackUp/Archive.php; and (2) Predicate.php, (3) Writer.php, (4)...
8.3AI Score
0.114EPSS
Multiple PHP remote file inclusion vulnerabilities in the BackUpWordPress 0.4.2b and earlier plugin for WordPress allow remote attackers to execute arbitrary PHP code via a URL in the bkpwp_plugin_path parameter to (1) plugins/BackUp/Archive.php; and (2) Predicate.php, (3) Writer.php, (4)...
7.8AI Score
0.114EPSS
WordPress BackUpWordPress Plugin <= 0.4.2 - Remote File Inclusion
Because og this vulnerability, the attackers can execute arbitrary PHP code via a URL in the "bkpwp_plugin_path" parameter. Solution Update the...
6.5AI Score
0.114EPSS
7.4AI Score
EPSS
Buffer overflow in wall for HP-UX 10.20 through 11.11 may allow local users to execute arbitrary code by calling wall with a large file as an...
7.5AI Score
0.0004EPSS
Buffer overflow in wall for HP-UX 10.20 through 11.11 may allow local users to execute arbitrary code by calling wall with a large file as an...
7.9AI Score
0.0004EPSS
Unfixed XSS vulnerability at msxml.webcrawler.com
Security researcher Skunkfoot, has submitted on 18/10/2007 a cross-site-scripting (XSS) vulnerability affecting msxml.webcrawler.com, which at the time of submission ranked 7800 on the web according to Alexa. We manually validated and published a mirror of this vulnerability on 02/11/2007. It is...
AI Score
Unfixed XSS vulnerability at www.reclamelog.nl
Security researcher FiLEFUSiON, has submitted on 24/07/2007 a cross-site-scripting (XSS) vulnerability affecting www.reclamelog.nl, which at the time of submission ranked 836188 on the web according to Alexa. We manually validated and published a mirror of this vulnerability on 07/08/2007. It is...
-0.1AI Score
[SECURITY] [DSA 1331-1] New php4 packages fix arbitrary code execution
Debian Security Advisory DSA 1331-1 [email protected] http://www.debian.org/security/ Moritz Muehlenhoff July 7th, 2007 http://www.debian.org/security/faq Package : php4 Vulnerability : several Problem-Type : remote...
7.7AI Score
0.041EPSS
Cisco Trust Agent for Mac OS X privilege escalation
It's possible to manipulate system settings with root permissions while message is displayed during user...
2.7AI Score
[SECURITY] [DSA 1296-1] New php4 packages fix privilege escalation
Debian Security Advisory DSA 1296-1 [email protected] http://www.debian.org/security/ Moritz Muehlenhoff May 21st, 2007 http://www.debian.org/security/faq Package : php4 Vulnerability : missing input sanitising...
6.4AI Score
0.02EPSS
Unfixed XSS vulnerability at architectuurfocus.ugent.be
Security researcher MaXWeL, has submitted on 19/05/2007 a cross-site-scripting (XSS) vulnerability affecting architectuurfocus.ugent.be, which at the time of submission ranked 14009 on the web according to Alexa. We manually validated and published a mirror of this vulnerability on 19/05/2007. It.....
-0.1AI Score
7.1AI Score