header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MySQL privilege elevation Exploit

This exploit adds a new admin user by taking advantage of a stack overrun vulnerability and the ability to create trigger files in MySQL. The attacker needs to have 'file' privileges for the target system and be able to create files owned by the 'mysql' user. By creating a trigger file with the attached user set as 'root@localhost', the exploit is able to execute commands with admin privileges. The exploit involves crashing the MySQL server to force it to recognize the trigger file and then creating a new user with all privileges enabled.

Vulnerability in dlopen() function in PHP source

The vulnerability allows a local attacker to gain unauthorized access to potentially sensitive information by exploiting the dlopen() function in PHP source when used with the Apache web server. The attacker can dump the processes memory into /tmp, which can be useful for various purposes.

Windows AlwaysInstallElevated MSI

This module checks the AlwaysInstallElevated registry keys which dictate if .MSI files should be installed with elevated privileges (NT AUTHORITYSYSTEM). The default MSI file is data/exploits/exec_payload.msi with the WiX source file under external/source/exploits/exec_payload_msi/exec_payload.wxs. This MSI simply executes payload.exe within the same folder. The MSI may not execute successfully successive times, but may be able to get around this by regenerating the MSI. MSI can be rebuilt from the source using the WIX tool with the following commands: candle exec_payload.wxs light exec_payload.wixobj

Unauthorized Network Reconnaissance in IPNetSentryX and IPNetMonitorX

Helper applications that are shipped with IPNetSentryX and IPNetMonitorX can be harnessed by a local attacker to provide for unauthorized network reconnaissance. The attacker can run the RunTCPDump utility with specific parameters to capture network traffic and gather sensitive information.

pHNews Remote Code Execution Exploit

The pHNews script is vulnerable to remote code execution due to insufficient input validation. An attacker can exploit this vulnerability by manipulating the 'templates_dir' parameter to execute arbitrary code on the target server. This exploit works when register_globals is set to On and magic quotes are turned off. The attacker can specify a command to be executed on the target server.

Half-Life Client Remote Buffer Overflow

The Half-Life Client is prone to a remotely exploitable buffer overflow vulnerability. The issue occurs in the client connection routine, used by the client to negotiate a connection to the Half-Life game server. Due to a lack of sufficient bounds checking, a malicious server may execute arbitrary code on an affected client.

Recent Exploits: