header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Prozilla Format String Exploit

This exploit targets Prozilla version 1.3.7.3 and takes advantage of a format string vulnerability. The vulnerability allows an attacker to execute arbitrary code or crash the application by providing a specially crafted format string as input. The exploit is not reliable as the previous stack overflow exploit. The Gentoo security team and Prozilla developers failed to spot this vulnerability. More information can be found at the website www.siyahsapka.org or deicide.siyahsapka.org.

ELOG Remote Shell Exploit

This exploit allows an attacker to gain remote shell access to ELOG versions up to 2.5.6. It is a fully automated filling mechanism that steals and decodes base_64 ELOG write passwords. By targeting a specific memory address, the exploit determines the version of ELOG and adjusts its attack accordingly. Note that the buffer length may vary depending on the Linux distribution. It is recommended to perform a port scan to identify the ELOG port, especially on hosts using ELOG daemon under Apache mod_proxy module. If the write password for a logbook cannot be obtained, other logbooks should be tried. The exploit currently supports up to 10 attributes/options in a logbook.

phpNUKE v7.4 exploit

This exploit creates a new admin with a specified password and allows the attacker to gain administrative control of the webPortal. The exploit is for phpNUKE v7.4. References: http://www.osvdb.org/9563. Coded by Silentium of Anacron Group Italy on 07/02/2005. Contact: anacrongroupitaly[at]autistici[dot]org. Developed under GPL license.

Recent Exploits: