header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AIX lquerylv 5.3, 6.1, 7.1, 7.2 local root exploit

This exploit takes advantage of known issues with debugging functions within the AIX linker library. We are taking advantage of known functionality, and focusing on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes. The CVEs we will be taking advantage of are CVE-2009-1786, CVE-2009-2669, and CVE-2014-3074. In each instance of the aforementioned CVEs, IBM merely patched the binaries which were reported in the original reports as being used for escalation of the vulnerabilities. This allowed for the lquerylv binary to slip by their patches and become an attack vector.

AIX lsmcode local root exploit

This exploit is used to gain root access on AIX 6.1/7.1/7.2.0.2 systems. It takes advantage of a vulnerability in the lsmcode binary, which allows an attacker to create a SUID root shell. The exploit sets environment variables, sets the umask to 000, executes the vulnerable binary, and then creates a SUID root shell. The exploit then cleans up the environment variables and executes the ibstat binary to gain root access.

redaxo CMS CSRF(Add Admin)

A Cross-Site Request Forgery (CSRF) vulnerability exists in redaxo CMS 5.2.0, which allows an attacker to add an admin user by sending a malicious request. The attacker can craft a malicious HTML page containing a form with hidden fields, which when visited by an authenticated user, will submit the form and add an admin user with the credentials specified in the form.

nodcms Cross Site Request Forgery

nodcms is vulnerable to Cross Site Request Forgery (CSRF) and Cross Site Scripting (XSS) attacks. An attacker can craft a malicious HTML page that when visited by an authenticated user, can create a new user with administrative privileges or inject malicious JavaScript code into the application.

Snews CMS Cross Site Request Forgery

This exploit allows an attacker to change the username and password of the admin without needing the old username and password. The attacker can craft a malicious HTML page with a form containing the new username and password and submit it to the vulnerable website. This will change the admin credentials to the ones specified by the attacker.

PCMan FTP Server 2.0 ACCT Command Buffer Overflow Exploit

PCMan FTP Server 2.0 is vulnerable to a buffer overflow attack when an overly long string is sent to the ACCT command. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted string to the affected command. This may allow attackers to execute arbitrary code.

MS Windows Server 2008/2008 R2/ 2012/2012 R2/ AD LDAP RootDSE Netlogon (CLDAP “AD Ping”) query reflection DoS PoC

The attacker sends a simple query to a vulnerable reflector supporting the Connectionless LDAP service (CLDAP) and using address spoofing makes it appear to originate from the intended victim. The CLDAP service responds to the spoofed address, sending unwanted network traffic to the attacker’s intended target. Amplification techniques allow bad actors to intensify the size of their attacks, because the responses generated by the LDAP servers are much larger than the attacker’s queries. In this case, the LDAP service responses are capable of reaching very high bandwidth and an average amplification factor of 46x and a peak of 55x has been seen.

SweetRice 1.5.1 Arbitrary Code Execution

SweetRice CMS Panel In Adding Ads Section SweetRice Allow To Admin Add PHP Codes In Ads File. A CSRF Vulnerabilty In Adding Ads Section Allow To Attacker To Execute PHP Codes On Server. In This Exploit I Just Added a echo '<h1> Hacked </h1>'; phpinfo(); Code You Can Customize Exploit For Your Self.

Recent Exploits: