header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

man-db Local Privilege Escalation

This exploit takes advantage of a vulnerability in the man-db package. By exploiting the open_cat_stream() function, an attacker can escalate their privileges and gain root access on the system. The exploit involves creating fake manpage directories and files, compiling a source file, and executing man-db/man.

EvansFTP (EvansFTP.ocx) Remote Buffer Overflow PoC

EvansFTP ActiveX is vulnerable to a remote buffer overflow. The properties RemoteAddress, ProxyPrefix, ProxyName, Password, ProxyBypassList, LoginName, and CurrentDirectory all suffer from buffer overflow when long strings are passed. The specific lengths at which each property overflows are mentioned.

ProSysInfo TFTP server TFTPDWIN <= 0.4.2 Universal Remote Buffer Overflow Exploit

This exploit targets ProSysInfo TFTP server TFTPDWIN version 0.4.2 and below. It allows a remote attacker to execute arbitrary code on the target system by sending a specially crafted request. The exploit takes advantage of a buffer overflow vulnerability in the software. The exploit author has provided a universal payload that works on all Windows versions. The exploit uses a custom shellcode to execute the 'calc' command. The author warns that they have no responsibility for any damage caused by using this exploit.

eZ Publish privilege escalation exploit

This is an exploit for a privilege escalation vulnerability in eZ Publish versions >= 3.5.6. The vulnerability allows an attacker to escalate their privileges and gain administrative access to the eZ Publish system. The exploit sends a malicious request to the target server, creating a new admin account with the provided username, password, and email. The new admin account will be activated and registered in the system.

Vinagre show_error() format string vulnerability

A format string error has been found on the 'vinagre_utils_show_error()' function that can be exploited via commands issued from a malicious server containing format string specifiers on the VNC name. Successful exploitation would then allow the attacker to execute arbitrary code with the privileges of the Vinagre user.

Recent Exploits: