header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Gravity Board X v1.1 (possibly prior versions) remote code execution exploit

This exploit allows an attacker to execute arbitrary code on a vulnerable Gravity Board X v1.1 (possibly prior versions) installation. The vulnerability is due to insufficient sanitization of user-supplied input in the 'csscontent' parameter of the 'editcss.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP POST request containing arbitrary commands to the vulnerable script. The commands will be executed with the privileges of the web server process.

WMP Plugin EMBED Exploit

The Windows Media Player plug-in for non-Microsoft browsers (Firefox, Opera, etc.) suffers from an exploitable overflow in its handling of EMBED tags. Specifically, a very long SRC property on such a tag can lead to an overflow that will corrupt a structured exception handling frame. The SEH frame is the vector of control that is exploited. DEP is turned off for non-Microsoft code, so there's no issue there. The overrun buffer (the SRC attribute) is seriously mangled before it is handled by the plug-in. In particular, any character with the sign bit set (> 0x7F) is replaced.

Power Daemon v2.0.2 Remote Format String Exploit

Power Daemon v2.0.2 Remote Format String Exploit is a vulnerability that allows an attacker to execute arbitrary code on the target system by exploiting a format string bug in the Power Daemon v2.0.2. The exploit uses a maliciously crafted string to overwrite the return address of the stack frame with the address of the shellcode. The shellcode then binds a shell to a port on the target system.

RunCMS <= 1.2 arbitrary remote inclusion exploit & <= 1.3a shell upload through FCKEditor

RunCMS versions <= 1.2 are vulnerable to arbitrary remote inclusion in modules/newbb_plus/class/class.forumposts.php and modules/newbb_plus/class/forumpollrenderer.php. The exploit can be triggered by sending a crafted URL to the target. Versions <= 1.3a are vulnerable to shell upload through FCKEditor, which can be used to upload a malicious shell and execute it.

Local r00t w00t t00t t00t

This exploit combines two vulnerabilities (CVE-2004-0950 and CVE-2004-0951) to gain root access on a default QNX 6.3.0 install. The exploit first checks if the file /etc/rc.d/rc.local is writable, and if it is, it creates a C program in /tmp/moo.c, compiles it, and adds a command to /etc/rc.d/rc.local to set the root UID and run a shell. The exploit then crashes the system and uses GDB to gain root access.

CPGNuke Dragonfly 9.0.6.1 remote commands execution through arbitrary local inclusion

CPGNuke Dragonfly 9.0.6.1 is vulnerable to remote commands execution through arbitrary local inclusion. This vulnerability is present in the install.php file which is not deleted after the Dragonfly installation. The vulnerability is present in lines 33-49 of the install.php file, where the application is vulnerable to an arbitrary local file inclusion attack. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious file path in the newlang parameter. This will allow the attacker to execute arbitrary commands on the vulnerable system.

Recent Exploits: