header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

W-Agora 4.2.0 Remote Commands Execution

W-Agora 4.2.0 (possibly prior versions) is vulnerable to remote commands execution through quicklist.php and/or upload features. An attacker can exploit this vulnerability by making changes in php.ini to allow_call_time_pass_reference and register_globals, then launching the script from Apache, filling requested fields, and uploading a shell.

Solaris 10 DtPrintinfo/Session Exploit (x86)

This exploit is a buffer overflow vulnerability in Solaris 10 DtPrintinfo/Session. It was discovered by Charles Stevenson (core) in 2005 and is used to gain root access. The exploit uses an environment variable to overwrite the return address of the stack and execute malicious code.

ca igateway debug remote overflow

This exploit is a buffer overflow vulnerability in the ca igateway debug remote service. It allows an attacker to execute arbitrary code on the vulnerable system by sending a specially crafted packet to the service. The exploit code is written in C and uses Winsock2 to connect to the service and send the malicious packet.

xine-cddb-server Format String Vulnerability

When playing an Audio CD, using xine-lib based media application, the library contacts a CDDB server to retrieve metadata like the title and artist's name. During processing of this data, a response from the server, which is located in memory on the stack, is passed to the fprintf() function as a format string. An attacker can set up a malicious CDDB server and trick the client into using this server instead of the pre-configured one. Alternatively, any user and therefore the attacker can modify entries in the official CDDB server. Using this format string vulnerability, attacker-chosen data can be written to an attacker-chosen memory location. This allows the attacker to alter the control flow and to execute malicious code with the permissions of the user running the application.

wzdftpd remote exploit by kcope

This exploit allows an attacker to execute arbitrary code on a vulnerable system by using the Net::FTP module to connect to the FTP server and then using the site command to execute a custom command. The exploit is written in Perl and requires the attacker to provide the host, port, username, password, and custom site command as arguments.

PhpMyFAQ 1.5.1 remote commands execution

PhpMyFaq 1.5.1 (possibly prior versions) is vulnerable to a remote shell injection vulnerability. This vulnerability allows an attacker to inject arbitrary commands and execute them on the vulnerable system. To exploit this vulnerability, the attacker must have access to the vulnerable system and must have the ability to modify the php.ini file. The attacker must also have the ability to launch the script from Apache. Once the script is launched, the attacker can fill in the requested fields and if magic_quotes_gpc is off, the attacker can launch commands.

PwnZilla 5 – One sploit fits all. (FireFox optimized)

This exploit takes advantage of a heap buffer overrun in the IDN host name handling code of Mozilla browsers. It will create a malicious host name and then use a heap spray to overwrite the return address of a function with the address of the shellcode.

Recent Exploits: