header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

mkdirhier /tmp/aap/bin

This exploit allows an attacker to inject and execute arbitrary commands on the target system. The attacker creates a directory structure using the 'mkdirhier' command and then exports a variable to a specific directory. The attacker then writes a shell script to the exported directory that copies the '/bin/sh' binary to a hidden location, changes its ownership and permissions, and executes it. Finally, the attacker runs the 'lsmcode' command to execute the injected code by executing the hidden shell binary '/tmp/.shh'.

PHP X 3.5.16 Remote SQL Injection Exploit

This exploit takes advantage of a SQL injection vulnerability in PHP X 3.5.16. By manipulating the 'news_id' parameter in the 'news.php' file, an attacker can execute arbitrary SQL queries and potentially gain unauthorized access to the database. The exploit uses a union-based SQL injection technique to retrieve sensitive information from the 'users' table.

SDMS Simple Document Management System v1.1.4 SQL Injection

The login system in SDMS Simple Document Management System v1.1.4 (and older versions) is vulnerable to SQL injection. The system does not properly filter the user input for the password field, allowing an attacker to inject malicious SQL code. By exploiting this vulnerability, an attacker can bypass the login system and gain admin access.

RXcscope Exploit

This exploit targets the RXcscope version 15.5 and minor. It allows an attacker to create symlinks with arbitrary names to a specified target file. The exploit takes two command line arguments: the target file and the maximum number of file creations. It then creates symlinks with names in the format cscope<process_id>.<iteration_number> in the temporary directory. The process IDs start from the current process ID and go up to the specified maximum process ID. The iteration number starts from 0 and increases by 1 for each symlink created. This exploit can be used to perform a denial of service attack by exhausting the file system with a large number of symlinks.

WinRAR 3.40 Buffer Overflow POC

This is a proof of concept code for a buffer overflow vulnerability in WinRAR 3.40. The vulnerability was discovered by Vafa Khoshaein on December 10, 2004. Running this code will create a file called vulnerable_zip.zip, which can be opened in WinRAR 3.40. There is a file inside the zip that, when deleted, triggers the buffer overflow.

Recent Exploits: