header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SUN Solaris SO_REUSEADDR Local Socket Hijack Bug

Solaris has a bug in the use of SO_REUSEADDR in that the Kernel favours any socket binding operation that is more specific than the general '*.*' wildcard bind(). As such, a malicious socket can bind to an already bound interface if a specific IP address is used. This hijack can be performed against any process over 1024, including root owned services, it is not limited to your own user account. One can then mimic the original service and snoop usernames / passwords, files and data with a trojan version of software, or just cause a DOS against the legitimate service.

Xoops <= 2.0.11 xmlrpc.php sql injection exploit by RST/GHC

This exploit is based on a vulnerability in Xoops <= 2.0.11 xmlrpc.php which allows an attacker to inject malicious SQL code into the application. The exploit is coded in Perl and uses the LWP::UserAgent module to send a specially crafted HTTP request to the vulnerable application. The exploit then parses the response to determine if the injection was successful.

Remote Nokia Affix btftp client exploit

This exploit is a buffer overflow vulnerability in the Affix Bluetooth stack. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted packet to the btftp service. The packet contains a malicious payload which is written to a file in the /var/spool/affix/Inbox directory. The attacker can then connect to the target system using telnet and execute the malicious payload.

phpBB 2.0.15 arbitrary command execution eXploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable phpBB 2.0.15 installation. The exploit works by sending a specially crafted request to the vulnerable viewtopic.php page, which then executes the command and returns the output. The exploit is written in Python and uses the urllib2 library to send the request.

MS05-017 Message Queuing Buffer Overflow Vulnerability Universal Exploit

A remote code execution vulnerability exists in Message Queuing that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.

Recent Exploits: