header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unixware Privilege Escalation Vulnerability

The vulnerability in Unixware's implementation of privileges allows regular users to attach a debugger to a running privileged program and take over its privileges. By finding a program listed in the /etc/security/tcb/privs file with the desired privileges and executable by the user, a malicious user can exploit the vulnerability and gain elevated privileges.

UnixWare 7.1 /usr/sbin/pkgcat exploit

It is possible to view the entries in /etc/shadow through exploiting a buffer overflow in pkgcat and pkginstall. Though neither of these binaries are setuid, the dacread permissions which are granted in /etc/security/tcb/privs give them the ability read /etc/shadow. When the oversized buffer data is passed to the programs as argv[1], the stack will be corrupted and it is possible to spawn a program which would "cat" /etc/shadow with the dacread privs.

Vulnerability in Seyon program in FreeBSD 3.3-RELEASE

The Seyon program in FreeBSD 3.3-RELEASE has a vulnerability that allows a local user to elevate their privileges. The program is installed setgid dialer, allowing a malicious user to access communications devices and other resources accessible by the dialer group.

Geeklog <= 1.4.0sr3 'f(u)ckeditor' remote commands execution

This exploit targets the Geeklog version 1.4.0sr3. The vulnerability allows an attacker to execute remote commands. The exploit takes advantage of the fckeditor feature, which is enabled by default and not protected. By uploading multiple extension files, an attacker can execute arbitrary shell commands on the target server.

Denial of Service (DoS) Attack against Microsoft SQL Server 7.0

If Microsoft SQL Server 7.0 receives a TDS header with three or more NULL bytes as data, it will crash. The crash will generate an event in the log with ID 17055 'fatal exception EXCEPTION_ACCESS VIOLATION'. The provided code is a DoS attack against MS SQL Server.

rpc.ttdbserver remote overflow

It is possible to crash rpc.ttdbserver by using the old tddbserver buffer overflow exploit. This problem is caused by a NULL pointer being dereferenced when rpc function 15 is called with garbage. You cannot make rpc.ttdbserver execute arbitrary code with this vulnerability. The consequence of this vulnerability being exploited is a denial of service condition (rpc.ttdbserver).

GeekLog <= 1.4.0 (_CONF[path]) Remote File Include Vulnerabilities

Variable $_CONF[path] not sanitized. When register_globals=on an attacker can exploit this vulnerability with a simple PHP injection script. The vulnerability can be exploited by injecting an evil script into the _CONF[path] parameter in various plugins of GeekLog. The affected plugins include links, polls, spamx, and more.

seh exploit, BOF

This exploit takes advantage of a buffer overflow vulnerability in ALLMediaServer 0.8. It allows an attacker to execute arbitrary code by sending a specially crafted payload to the target server. The exploit uses a combination of a short jump (NSEH) and a POP POP RETN (SEH) to bypass stack protection mechanisms and gain control of the program flow. The payload can be replaced with any desired shellcode.

Recent Exploits: