header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Logic flaw in Java JRE with backdoor potential

The method in which Java Web Start support has been added to the JRE is not less than a deliberately embedded backdoor or a flagrant case of extreme negligence. The code snippet provided shows a subroutine that is responsible for opening a registry key with the path "JNLPFileShellOpenCommand" and it sets the desired access rights and options. This vulnerability can potentially allow an attacker to execute arbitrary code or perform unauthorized actions on the affected system.

Local Glibc shared library (.so) exploit

This exploit takes advantage of the _init section in a shared library to execute arbitrary code or crash an application. By overwriting the _init section with shellcode or malicious data, an attacker can exploit applications that use shared libraries, such as Mozilla, Geany IDE, Compiz, and Epiphany web browser. The exploit involves creating a custom compiled file with a custom _init section that executes the execve() function to spawn a shell. The exploit is in the form of a shared library file (.so).

GNU Mailutils 0.6 imap4d ‘search’ format string exploit

This exploit takes advantage of a format string vulnerability in GNU Mailutils 0.6 imap4d. By sending a specially crafted 'search' command, an attacker can execute arbitrary code on the target system. This exploit uses hardcoded values from GNU/Debian testing (etch).

Java Mini Web Server <= 1.0 Path Draversal & Cross Site Scripting

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. A Path Traversal attack aims to access files and directories that are stored outside the web root folder.

Recent Exploits: