header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Proof of concept

The exploit allows an attacker to escalate their privileges from a regular user to root user. The attacker creates a script that copies the /bin/sh binary to their user directory, changes the permissions and ownership of the copied binary to root, and then creates a symbolic link to a system file. When the system file is executed, it runs the copied /bin/sh binary as root, giving the attacker root privileges.

Linux 2.4.20 knfsd kernel signed/unsigned decode_fh DoS

The vulnerable code is in the decode_fh function in the fs/nfsd/nfs3xdr.c file. By sending a malicious fhsize value in the diroparg xdr argument, an attacker can trigger a denial of service vulnerability. The vulnerable host must have an accessible exported directory previously mounted by the attacker. Changing the size variable to an unsigned int or checking for size < 0 can fix the issue.

PowerTCP ActiveX DartFtp.dll Remote Code Execution

The PowerTCP ActiveX component, specifically the DartFtp.dll, is vulnerable to remote code execution. An attacker can exploit this vulnerability by crafting a malicious script and tricking a user into clicking a button that launches the exploit. The vulnerability allows the attacker to execute arbitrary code with the privileges of the user running the affected software.

Exploit for phpBB 1.0.0 – 2.0.10

This exploit allows an attacker to execute arbitrary commands on a system running phpBB versions 1.0.0 to 2.0.10. The attacker needs to modify the b4b0.php file with the correct URL to their backdoor and the correct filename for the backdoor. After uploading the modified file to a web server, the attacker can use telnet to connect to the exploited system and execute commands.

PhpWebGallery <= 1.7.2 Remote Session Hijacking / Code Execution Exploit

An attacker could be able to inject and execute PHP code through $_GET['sort'], that is passed to create_function(). Only admin can access to the plugins management interface, but the attacker might be able to retrieve a valid admin session id using the SQL injection bug in comments.php.

Vulnerability in Hosting Controller allows directory browsing

The Hosting Controller software has a security flaw that allows attackers to browse any file and any directory on the server. The vulnerability exists in the admin/mail/Statsbrowse.asp and admin/iis/Generalbrowse.asp files. By manipulating the URL, an attacker can view the contents of the server's hard disk.

Recent Exploits: