header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Simple PHP Blog <= 0.4.7.1 cmmnds xctn exploit

Simple PHP Blog version 0.4.7.1 and below is vulnerable to arbitrary local inclusion vulnerability. This vulnerability can be exploited by an attacker to inject malicious code into the Apache log file and execute arbitrary commands on the server. This vulnerability requires magic_quotes_gpc to be set to Off.

Ubuntu Breezy stores the installation password in plain text

Ubuntu Breezy stores the installation password in plain text in two vulnerable files, /var/log/installer/cdebconf/questions.dat and /var/log/debian-installer/cdebconf/questions.dat. An attacker can use the Kristian Hermansen's 'Eazy Breezy' Password Recovery Tool to extract the password from these files.

PeerCast <=0.1216 remote exploit

This exploit is a remote code execution vulnerability in PeerCast <=0.1216. It allows an attacker to execute arbitrary code on the vulnerable system by sending a malicious payload to the target system. The payload contains shellcode that binds a port and allows the attacker to gain access to the system.

Jupiter CMS <= 1.1.5 multiple XSS attack vectors

Jupiter CMS (http://www.highstrike.net/) is a dynamic CMS system like mambo or limbo, allowing users to subscribe and posts events. Because no filtering is done upon [image] BBcode input, any user is capable of inserting arbitrary javascript code, allowing for credential theft leading/session hijacking and possibly site defacement. Examples of this include making a messagebox pop up saying 'XSS', stealing session ID's, and redirecting users to a page of the attacker's choice.

GNU PeerCast <= v0.1216 Remote Exploit

A remotely exploitable buffer overflow has been identified by INFIGO-2006-03-01 which can be potentially exploited to execute arbitrary code due to insufficient bounds checking on a memory copy operation occuring on the stack. All versions upto and prior to v0.1216 are believed to be vulnerable. Return address does a "jmp esp" which references the start of our shellcode and as such will work on multiple distributions and VA randomized hosts.

Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service Exploit

This exploit is based on a vulnerability in the Dropbear and OpenSSH Server code. The vulnerable code is in svr-main.c, where the MAX_UNAUTH_CLIENTS variable is not properly checked. This allows an attacker to send a large number of connections to the server, causing it to crash.

Jiros Banner Experience Pro Unauthorized Admin Add Exploit

This exploit allows an attacker to add an admin account to the Jiros Banner Experience Pro application without authorization. The attacker can use the given dork to find vulnerable sites and then use the exploit to add an admin account with the given username, email, and password. The exploit is triggered when the attacker submits the form.

CilemNews System <= 1.1 (yazdir.asp haber_id) SQL-inject xpl

CilemNews System version 1.1 is vulnerable to a SQL injection vulnerability in the 'yazdir.asp?haber_id=' parameter. An attacker can exploit this vulnerability to gain access to the admin panel of the application. The attacker can use the '1%20union%20select%200,admin,sifre,0,0,0,0,0,0,0,0,0,0,0%20from%20ayarlar%20where%20admin=admin' payload to exploit this vulnerability.

Recent Exploits: