header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ktsuss suid Privilege Escalation

This module attempts to gain root privileges by exploiting a vulnerability in ktsuss versions 1.4 and prior. The ktsuss executable is setuid root and does not drop privileges prior to executing user specified commands, resulting in command execution with root privileges. This module has been tested successfully on: ktsuss 1.3 on SparkyLinux 6 (2019.08) (LXQT) (x64); and ktsuss 1.3 on SparkyLinux 5.8 (LXQT) (x64).

ChaosPro 3.1

The exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in ChaosPro 3.1. This can be achieved by sending a specially crafted payload to the vulnerable application. The payload adjusts the stack and then executes a shell reverse TCP connection to the attacker's specified IP and port. The exploit payload is generated using msfvenom and uses the x86/alpha_upper encoder to avoid bad characters. The exploit is specific to the Windows platform.

123tkShop SQL Injection Vulnerability

An attacker can gain Administrative rights with this authentication bypass exploit using a payload constructed with base64 encoding. The vulnerable code is in the ./123tkShop/shop/mainfile.php file in the is_admin function starting on line 156. The attack works regardless of the magic_quotes_gpc and register_globals settings. The exploit can be executed through the URL http://127.0.0.1/123tkShop/shop/admin.php?admin=J3VuaW9uIHNlbGVjdCAncGFzc3dvcmQnLyogOnBhc3N3b3Jk

Recent Exploits: