header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adobe Acrobat 9.1.2 NOS Local Privilege Escalation Exploit (alwaysdirtyneverclean.zip)

This exploit is based on the brief information provided by Nine:Situations:Group (http://www.milw0rm.com/exploits/9199). Exploiting improper permissions is fun. A few notes are in order though. The getPlus service (that I tested, via 9.1.2) isn't installed as an 'Automatic' service, therefore making it slightly harder (but not hard) to practically use to your advantage. But I tested running this code under a GUEST account and it worked pretty good (just the first time though). Change the values as needed, compile and run. Things could be more or less silent, lethal or non-lethal... it is completely up to you. Things cannot get much simpler than this.

WINMOD V 1.4 (.lst File) Local Buffer Overflow Exploit (SEH)

This exploit is a local buffer overflow exploit for the WINMOD V 1.4 (.lst File). It uses a 2880 byte buffer to overwrite the SEH handler, followed by a 6 byte NOP sled and a shellcode of 464 bytes. It was tested on Windows XP Pro SP2 (EN).

PowerUpload Script Information Exploit

A Cross-Site Scripting (XSS) vulnerability exists in PowerUpload. An attacker can inject arbitrary JavaScript code into the application by setting the 'myadminname' cookie to 'YWRtaW5='. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow Exploit (SEH)

This exploit is for Soritong MP3 Player 1.0 (SKIN) which is vulnerable to a local stack overflow exploit. The exploit is written in Perl and uses a win32_exec payload from Metasploit. The exploit code contains a shellcode which is 584 bytes long followed by a 6 byte NSEH and a 4 byte SEH. The shellcode is then followed by 1000 bytes of junk data.

Streaming Audio Player 0.9 (skin) Local Stack Overflow (SEH)

This exploit is a local stack overflow vulnerability in Streaming Audio Player 0.9 (skin). It allows an attacker to execute arbitrary code by overflowing the buffer with a malicious payload. The payload is encoded using the PexAlphaNum encoder and is executed using the win32_exec command. The exploit uses the SEH (Structured Exception Handler) technique to bypass security measures.

Acoustica MP3 Audio Mixer v.2.471 Demo Buffer Overflow

A buffer overflow vulnerability exists in Acoustica MP3 Audio Mixer v.2.471 Demo. The vulnerability is caused due to a boundary error when handling .m3u files. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted .m3u file. Successful exploitation may allow execution of arbitrary code.

Alibaba-clone CMS (SQL/bSQL) Remote SQL Injection

Alibaba-clone CMS is vulnerable to remote SQL injection. Attackers can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'IndustryID' parameter of the 'category.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information stored in the database, such as usernames and passwords.

DD-WRT httpd Server Remote Root Vulnerability

The vulnerability exists in the latest 24 sp1 version of the DD-WRT firmware. The problem is due to many bugs and bad software design decisions. There are two issues: 1) No metacharacters handling and 2) Command gets executed even without successful authentication. The httpd server runs as root which is the third issue.

Recent Exploits: