header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MySQL Scanner & MySQL Server for Windows Remote SYSTEM Level Exploit

This exploit allows an attacker to gain SYSTEM level access to a Windows machine running a vulnerable version of MySQL Server. The attacker can use the pnscan tool to scan for vulnerable MySQL servers and the mysql_win_remote.pl tool to exploit the vulnerability. The accounts file holds the user/password combinations to try and the hits are saved in the jack.pot file.

SSH Tectia Remote Authentication Bypass

An attacker in the possession of a valid username of an SSH Tectia installation running on UNIX (verified: AIX/Linux) can login without a password. The bug is in the SSH USERAUTH CHANGE REQUEST routines which are there to allow a user to change their password. A bug in this code allows an attacker to login without a password by forcing a password change request prior to authentication.

FreeSSHD all version Remote Authentication Bypass ZERODAY

FreeSSHD all versions are vulnerable to a remote authentication bypass vulnerability. This vulnerability was discovered and exploited by Kingcope in 2011. To exploit this vulnerability, an attacker can use the ssh.exe command with a valid username and the host. Valid usernames can include root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test, ssh, sftp, ftp, or anything else the attacker can imagine. The vulnerable banner of the most recent version is SSH-2.0-WeOnlyDo 2.1.3.

FreeFTPD all versions Remote System Level Exploit Zero-Day

This exploit allows attackers to bypass authentication and gain system level access to FreeFTPD servers. The exploit uses a modified version of ssh.exe to bypass authentication, and then uploads nullevent.exe, MSVCR100.dll, and nullevent.mof to the server. The nullevent.mof file is then used to execute the connect back shell, which will connect back to the attacker's netcat listener after 1 minute.

MySQL Heap Overrun

As seen below $edx and $edi are fully controlled, the current instruction is => 0x83a6b24 <free_root+180>: mov (%edx),%edi which means 4 bytes can be controlled by 4 bytes with this function pointers and GOT entries can be rewritten to execute arbritrary code. A user account (with less privileges) is needed. Beware: this script will change the users password to an undefined value.

MySQL Server exploitable stack based overrun

A stack-based buffer overflow vulnerability exists in MySQL Server versions 5.5.19-log and below (tested with Ver 5.1.53-log for suse-linux-gnu too). An unprivileged user (any account, including anonymous account) can exploit this vulnerability to overwrite the instruction pointer with 0x41414141, which will yield a shell as the user 'mysql' when properly exploited.

Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday

This exploit is a post-auth, udf technique which allows attackers to gain SYSTEM level access to a Windows machine running Oracle MySQL. It requires a valid database admin user and his password for the exploit to work properly. The exploit is mirrored at the farlight website http://www.farlight.org and includes a mass scanner. Installation instructions are provided in the text.

Recent Exploits: