header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Joomla-SMF Forum Bridge For Mambo 4.5.3+ And Mambo 4.5.3+ Remote File Inclusion Vulnebrality

A remote file inclusion vulnerability exists in SMF Forum 1.3.1.3 Bridge Component For Joomla And Mambo. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file path to the vulnerable application. This can allow the attacker to execute arbitrary code on the vulnerable system.

com_videodb Mambo Componenet <= 0.3en Remote Include Vulnerability

A remote include vulnerability was found in the com_videodb Mambo Component version 0.3en. The bug was found in the file core/videodb.class.xml.php, which contains a global variable $mosConfig_absolute_path. An attacker can exploit this vulnerability by sending a malicious request to the server, such as http://[site]/[mambo]/components/com_videodb/core/videodb.class.xml.php?mosConfig_absolute_path=[shell], which can allow the attacker to execute arbitrary code on the server.

flushcms (tpath) Remote File Inclusion Vulnerability

flushcms (tpath) is prone to a remote file-inclusion vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code within the context of the vulnerable application.

Rocks Clusters <=4.1 umount-loop local root exploit

This exploit is a quick and nasty version of the exploit. It makes sure the . is writable and cleans up afterwards. It imports the os module, gets the current working directory, creates a file called x, writes a shell script to it, prints a message, and then runs the umount-loop command with the shell script. Finally, it runs the shell script.

h00lyshit Local Race Vulnerability

h00lyshit is a local race vulnerability that affects Linux 2.6 and various distros. It allows an attacker to execute arbitrary code with root privileges. The exploit involves creating a very large file on the disk, then junking the cache and running the h00lyshit program. The program then creates a race condition between the kernel and the user, allowing the user to execute arbitrary code with root privileges.

PRCTL local root exp By: Sunix

This exploit is a local privilege escalation vulnerability in the Linux kernel. It affects systems with kernel versions 2.6.13 to 2.6.17.4 and 2.6.9-22.ELsmp. The exploit uses the prctl() system call to set the dumpable flag to 2, which allows the attacker to create a core dump file of the process. The attacker then kills the process with a SIGSEGV signal, which causes the kernel to create a core dump file in the /etc/cron.d directory. The attacker then creates a cron job to execute a setuid shell in the /tmp directory. This allows the attacker to gain root privileges.

Recent Exploits: