header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

snort 2.4.0 – 2.4.2 Back Orifice Pre-Preprocessor Remote Exploit

This exploit is a remote code execution vulnerability in Snort 2.4.0 - 2.4.2. It uses a pre-preprocessor to send a malicious payload to the target system. The payload contains a shellcode that binds a port and connects back to the attacker. The exploit was tested on Linux debian24 2.4.27-2-386 with gcc version 3.3.5 and Snort 2.4.2.

Moodle <= 1.6dev get record() SQL injection / remote commands execution

Moodle <= 1.6dev is vulnerable to SQL injection and remote command execution. An attacker can exploit this vulnerability by sending malicious input to the vulnerable application. This can allow the attacker to execute arbitrary SQL commands and execute arbitrary commands on the server.

FreeBSD master.passwd disclosure exploit

This exploit allows an attacker to gain access to the master.passwd file on an unpatched FreeBSD 4.11-RELEASE system. The exploit works by creating a socket connection and sending a file containing 64000000 'A' characters. The file is then written to a kmem file which contains the master.passwd file.

SuSE Linux 9.{1,2,3}/10.0, Desktop 1.0, UnitedLinux 1.0 and SuSE Linux Enterprise Server {8,9} ‘chfn’ local root bug

This exploit is for SuSE Linux 9.{1,2,3}/10.0, Desktop 1.0, UnitedLinux 1.0 and SuSE Linux Enterprise Server {8,9} 'chfn' local root bug. It allows a user to gain root privileges by setting the SHELL environment variable to the path of a shell and then running the chfn command with a modified password file. The exploit then runs the su command to gain root privileges.

F-Secure Anti-Virus Internet Gatekeeper for Linux <2.15.484

This exploit is for F-Secure Anti-Virus Internet Gatekeeper for Linux <2.15.484. It is a local root exploit that takes advantage of a vulnerability in the suid cgi scripts. It creates a symlink to the vulnerable cgi script and then creates a symlink to the /etc/shadow file. It then calls the vulnerable cgi script which will overwrite the shadow file with the contents of the cgi script. This will give the attacker root access.

Recent Exploits: