header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Setuid perl PerlIO_Debug() overflow

This exploit demonstrates a buffer overflow vulnerability in the PerlIO_Debug() function in Perl. By exploiting this vulnerability, an attacker can gain root privileges on a vulnerable system. The exploit code sets the effective user ID (euid) to 0, allowing the attacker to execute commands with root privileges. This exploit has been tested on Debian 3.1 with perl-suid version 5.8.4-5.

Blind SQL Injection in Lore 1.5.6

The script version Lore 1.5.6 is vulnerable to blind SQL injection. The vulnerability can be exploited by sending a specially crafted request to the 'article.php?id' parameter. The 'Comentarios Habilitados' (Add Comment) feature is affected. An attacker can use the 'intext:"Powered by Lore 1.5.6"' dork to find potentially vulnerable websites. This exploit allows an attacker to extract sensitive information from the database.

OSH 1.7 Exploit

The OSH 1.7 has a buffer overflow vulnerability in the iopen() function. By invoking osh in non-interactive mode and providing a valid command as argv[1], an attacker can trigger the overflow and potentially execute arbitrary code. The vulnerability lies in the improper handling of inputstring, allowing an attacker to overflow the buffer. This can lead to remote code execution with root privileges.

Savant Web Server 3.1 Remote Buffer Overflow Exploit

This exploit sends a 253-byte payload to the Savant Web Server 3.1, causing a buffer overflow. The exploit overwrites the EIP register with bytes 254 to 258, successfully creating an Administrator user on the victim server. It has been tested on a Windows Server 2003 using the return address 00b7ead8.

Recent Exploits: