header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DRUPAL-SA-2005-002 php injection in comments

A vulnerability in Drupal allows an attacker to inject arbitrary PHP code into comments. This vulnerability is due to insufficient sanitization of user-supplied input in the comment module. By sending a specially crafted request, an attacker can exploit this vulnerability to inject arbitrary PHP code into comments, which will be executed in the context of the web server process.

XML-RPC Remote Command Execution Exploit By Mike Rifone

This exploit allows an attacker to execute arbitrary commands on a vulnerable server running a vulnerable version of XML-RPC. The exploit works on da phpxmlrpc, and da PEAR XML_RPC too. All the attacker needs to do is to put the URL to the server and they will get a shell.

Microsoft Internet Explorer javaprxy.dll COM Object Exploit -Unpatched-

This exploit allows an attacker to gain remote access to a vulnerable system by exploiting a vulnerability in the javaprxy.dll COM object. The vulnerability is present in multiple versions of Internet Explorer, including IE 5.01 SP3 and SP4 on Windows 2000 SP3 and SP4, IE 6 SP1 on Windows 2000 SP3 and SP4, IE 6 SP1 on Windows XP SP1, IE 6 on Windows XP SP2, IE 6 SP1 on Windows XP 64-Bit SP1 (Itanium), IE 6 on Windows Server 2003, IE 6 on Windows Server 2003 SP1, IE 6 on Windows Server 2003 for Itanium-based Systems, IE 6 on Windows XP 64-Bit Edition Version 2003 (Itanium), IE 6 on Windows Server 2003 x64 Edition, and IE 6 on Windows Server 2003 with SP1 for 64-Bit Itanium-based Systems.

Solaris 9 on SPARC

A vulnerability in Solaris 9 on SPARC allows local users to gain root privileges by exploiting a setuid() and execve() vulnerability. The exploit involves creating a shared library with the malicious code and setting the LD_AUDIT environment variable to point to the shared library. When the ping command is executed, the malicious code is executed with root privileges.

Solaris 10 Local Root Exploit

This exploit is a local privilege escalation vulnerability in Solaris 10. It allows a local user to gain root privileges. The exploit uses a shared library to execute a shellcode which spawns a root shell. The exploit was tested on SunOS 5.10 Generic i86pc i386 i86pc and SunOS 5.9 Generic_112233-12 sun4u. It does not work on SunOS 5.8 Generic_117350-02 sun4u sparc. The exploit code is written in C and compiled into a shared library. The shared library is then loaded using the LD_AUDIT environment variable. This allows the shellcode to be executed with root privileges.

Recent Exploits: