header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FTP server (GNU inetutils 1.4.2) Remote Root Exploit

This program remotely exploits the most recent versions of GNU inetutils ftpd on linux systems. The exploit works by creating a shared library including a bindshell, creating a ld.so.preload file referencing the previously created shared library, connecting to the remote ftp server and logging in using the ftp account, uploading the shared library and ld.so.preload into /etc, and running /bin/ls. This results in a root shell.

ar_memberscript – remote file include vulnerability (all versions)

ar_memberscript is a script used by many anime sites to manage their members, news, and some content, in some cases 'premium media'. The vulnerability is due to the lack of proper sanitization of user-supplied input to the 'script_folder' parameter in 'usercp_menu.php'. An attacker can exploit this vulnerability by sending a malicious URL to an unsuspecting user, which when clicked, will execute arbitrary code on the vulnerable system.

Oracle Portal HTTP Response-Splitting Vulnerabilities

Oracle Portal is prone to multiple HTTP response-splitting vulnerabilities because the application fails to properly sanitize user-supplied input. A remote attacker may exploit these vulnerabilities to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

IE7 Calculator Popup

This exploit allows an attacker to execute arbitrary code on a vulnerable system by hijacking a legitimate DLL file. The attacker must upload a malicious DLL file to the victim's desktop as one of the following hidden DLL files: sqmapi.dll, imageres.dll, or schannel.dll. When the victim runs IE7, the malicious DLL will be loaded and the attacker's code will be executed. This exploit was tested on Windows XP SP2 with fully patched IE7.

Core Security Technologies – Corelabs Advisory ProFTPD Controls buffer overflow

This exploit works with default proftpd 1.3.0a compiled with gcc 4.1.2 (ubuntu edgy). It builds a payload with the format on the stack as AAAA = EBX BBBB = ESI CCCC = EDI DDDD = EBP EEEE = EIP, and sends it to the control socket. This causes a buffer overflow, which can be used to execute arbitrary code.

Knowledgebase kb_mods Multiple Remote Vulnerablities

The variable of phpEx & many variables are not sanitized, allowing attackers to inject malicious code into the application. This can be exploited to include arbitrary files from local or external resources, or to execute arbitrary PHP code.

mx_modsdb v.1.0.0 (common.php) Remote Inclusion Vulnerability

A remote inclusion vulnerability exists in mx_modsdb v.1.0.0 due to insufficient sanitization of user-supplied input to the 'module_root_path' parameter in 'common.php'. An attacker can exploit this vulnerability to execute arbitrary remote code on the vulnerable system.

Recent Exploits: