header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PulseAudio setuid Local Privilege Escalation Vulnerability

PulseAudio setuid Local Privilege Escalation Vulnerability is a vulnerability discovered by Tavis Ormandy, Julien Tinnes and Yorick Koster. It allows an attacker to gain root privileges by exploiting a setuid binary in PulseAudio. The exploit was tested with success on Ubuntu 9.04 (x86-64) and Slackware 12.2.0 (x86). The exploit is available for download at https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz).

PulseAudio Race Condition Privilege Escalation

This exploit is a race condition vulnerability in PulseAudio, which allows a local user to gain root privileges. The exploit works by creating a hard link to the PulseAudio binary, and then creating a second hard link to a malicious shell script. The exploit then forks a child process, which executes the PulseAudio binary. If the malicious shell script is executed before the PulseAudio binary, the user will gain root privileges.

FreeBSD PECOFF Executable Loader Panic DoS

This code will panic the FreeBSD kernel due to a bug in the PECOFF executable loader code ('options PECOFF_SUPPORT' in kernel config or `kldload pecoff`). The panic seems to be caused in generic_bcopy due to a page fault, which may be exploitable. This exploit is only a DoS at the moment.

MiniCWB 2.3.0 Multiple Remote File Inclusion Vulnerability

MiniCWB version 2.3.0 is vulnerable to multiple remote file inclusion vulnerability. An attacker can exploit this vulnerability by sending a malicious URL in the 'LANG' parameter of the vulnerable file. This can allow the attacker to execute arbitrary code on the vulnerable system.

Netrix CMS 1.0 (Auth Bypass) Remote SQL Injection Vulnerability

A vulnerability in Netrix CMS 1.0 allows an attacker to bypass authentication and gain access to the administrative panel. This is done by sending a crafted HTTP request to cikkform.php with the parameter cid set to 1. This will allow the attacker to gain access to the administrative panel and edit anything or put on their own index.

Silentum Guestbook v2.0.2 (silentum_guestbook.php) Sql Injection Vuln.

Silentum Guestbook v2.0.2 is vulnerable to a SQL injection vulnerability. An attacker can exploit this vulnerability to gain access to the database and extract sensitive information such as usernames, passwords, and emails. The vulnerable parameter is 'messageid' which can be manipulated to inject malicious SQL code. An example of the malicious code is 'silentum_guestbook.php?messageid=-1 UNION ALL SELECT 0,0,0,0,concat(u_name,0x3a,u_password,0x3a,u_email),0,0 FROM silentum_admin/'.

Adobe related service (getPlus_HelperSvc.exe) local elevation of privileges

Adobe downloader used to download updates for Adobe applications. Shipped with Acrobat Reader 9.x. The executable file is installed with improper permissions, with 'full control' for Builtin Users; a simple user can replace it with a binary of choice. At the next reboot it will run with SYSTEM privileges.

RadNICS Gold v5 Multiple Remote Vulnerabilities

RadNICS Gold v5 is vulnerable to SQL injection. An attacker can exploit this vulnerability to gain access to the database and execute arbitrary SQL commands. The vulnerability is located in the "fid" parameter of the "view_forum" module. An attacker can inject malicious SQL code to the "fid" parameter value in order to execute arbitrary SQL commands.

Recent Exploits: