header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Stack Overflow in eZnet.exe – Remote Exploit

Will download a trojan from any address which you provide on the target system, then will execute the trojan. For this exploit I have tried several strategies to increase reliability and performance: + Jump to a static 'call esp' + Backwards jump to code a known distance from the stack pointer since the stack address seems to change for each version of eznet. + Works out the byte difference for custom urls (must be no longer than 254 bytes!!) + Causes eznet.exe to restart (not really my choice ;o) + Shellcode steals addresses from a static module.

OSH 1.7-14 Exploit

The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell. It allows the administrator to carefully limit the access of special commands and files to the users whose duties require their use, while at the same time automatically maintaining audit records. The configuration file for Osh contains an administrator defined access profile for each authorized user or group. The exploit takes advantage of a bug in the code that handles substitutions of environmental variables. By appending to the return value of the getenv() function, an attacker can overwrite one of the environmental variables passed to the child process.

Joomla Component com_jsjobs SQL Injection Vulnerability

The Joomla component com_jsjobs is vulnerable to SQL Injection. The vulnerability exists in the view.html.php file in the 'categories' section. The code on line 53 does not properly sanitize user input, allowing an attacker to inject malicious SQL queries. This can lead to unauthorized access to sensitive information stored in the server's database.

Persian E107 XSS Vulnerability

The Persian E107 script is vulnerable to XSS. An attacker can exploit this vulnerability by registering on the website and then going to the usersettings.php page. They can then edit their signature and insert malicious code, such as a script that redirects users to a different website. This can be used to steal cookies or perform other malicious actions.

Recent Exploits: