header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Lotus CMS Fraise v3.0 LFI – Remote Code Execution Exploit

The exploit takes advantage of a file inclusion vulnerability in the Lotus CMS Fraise v3.0. The vulnerability exists in lines 15-23 of the core/lib/router.php file. The CMS also allows an attacker to inject malicious content by commenting on blog posts. The exploit includes proxy support, dynamic User-agent generation, Apache access log and Lotus blog comment injection routines, and custom shell creation and deletion.

Linux Kernel CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit)

This exploit takes advantage of an underflow vulnerability in the Linux kernel to escalate privileges from CAP_SYS_ADMIN to root. It uses a different approach than the original exploit, by underflowing to static values inside the kernel that are referenced as pointers to userspace. This method is simple and reliable.

Winamp 5.5.8.2985 (in_mod plugin) Stack Overflow (SEH)

Winamp 5.5.8.2985 with the in_mod plugin is vulnerable to a stack overflow (SEH) exploit. This exploit allows an attacker to execute arbitrary code on a Windows XP SP3 system that is fully patched. The exploit was discovered and documented by fdiskyou and can be found on the Exploit-DB website (http://www.exploit-db.com/exploits/15248/). The exploit uses a payload that sets up a reverse TCP shell on the attacker's machine. The exploit code and proof-of-concept were released by fdiskyou. This version of the exploit includes proper shellcode and addresses a previously incomplete release. Further references and related exploits can be found on the Exploit-DB website (http://www.exploit-db.com/winamp-exploit-part-2/ and http://www.exploit-db.com/exploits/15287/). Special thanks are given to Mighty-D, Ryujin, and the Exploit-DB Dev Team.

HP Data Protector Manager v6.11

The vulnerability allows remote attackers to cause a denial of service (DoS) condition on the target system. By sending a specially crafted packet to the RDS service, the program exits due to memory allocation failure. The vulnerability is caused by a flaw in the _ncp32.dll and _rm32.dll files. The _ncp32.dll file receives the packet and uses the _rm32.dll file to allocate memory. However, when the packet size is too big, the malloc function fails to allocate the required memory, causing the program to exit. This vulnerability has been tested on Windows XP SP2 and Windows XP SP3.

Recent Exploits: