header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Local Privilege Escalation in RealOne Player

The configuration files for the RealOne Player are installed in a hidden folder in a user's home directory. These configuration files have insecure permissions, allowing an attacker in the same group as the target user to modify the files and escalate privileges to that of the target user. The exploit involves modifying the path to shared libraries and writing malicious shared libraries.

Remote Buffer Overflow in Roger Wilco Server

A vulnerability has been reported for various Roger Wilco server releases. The problem occurs server-side, and can be triggered when processing malformed client packets. Specifically, when connecting to a server the Roger Wilco client transmits a packet containing the size of data to be copied into an internal buffer. As a result, a malicious user could modify the size to result in excessive data being copied into a previously allocated buffer. This could ultimately allow for sensitive server memory to be corrupted, potentially resulting in the execution of arbitrary code.

Unauthenticated local file inclusion

Due to insufficient input validation, an unauthenticated attacker can disclose arbitrary local files with the privileges of the webserver. This includes the user/administrator database. As the attacker-controlled path is passed to the PHP include() function, code execution is also possible. Furthermore, the path is then passed to the unlink() function and therefore can be used to delete arbitrary files in the filesystem.

Buffer Overrun in Ipswitch WS_FTP Server

This exploit takes advantage of a buffer overrun vulnerability in Ipswitch WS_FTP Server when handling the APPE and STAT FTP commands. An FTP user can send excessive input to these commands, potentially executing arbitrary code on the server or causing a denial of service.

MySQL privilege elevation Exploit

This exploit adds a new admin user by taking advantage of a stack overrun vulnerability and the ability to create trigger files in MySQL. The attacker needs to have 'file' privileges for the target system and be able to create files owned by the 'mysql' user. By creating a trigger file with the attached user set as 'root@localhost', the exploit is able to execute commands with admin privileges. The exploit involves crashing the MySQL server to force it to recognize the trigger file and then creating a new user with all privileges enabled.

Vulnerability in dlopen() function in PHP source

The vulnerability allows a local attacker to gain unauthorized access to potentially sensitive information by exploiting the dlopen() function in PHP source when used with the Apache web server. The attacker can dump the processes memory into /tmp, which can be useful for various purposes.

Recent Exploits: