header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oracle10g R1 and R2 Privilege Escalation Exploit

This exploit targets Oracle10g R1 and R2 versions prior to CPU Oct 2006. It allows an attacker to escalate their privileges by creating a session and a procedure. The exploit uses a function called F1, which is granted DBA privileges to the user 'TEST'. The exploit then executes the function and commits the changes. Finally, it retrieves user role privileges using the user_role_privs table. The exploit was developed by Joxean Koret.

Exploit for Oracle10g R1 and R2 prior to CPU Oct 2006

This exploit allows an attacker with CREATE SESSION privileges to insert malicious code into the sys.sysauth$ table in Oracle10g R1 and R2 prior to CPU Oct 2006. This can lead to unauthorized access and potential compromise of the system.

MediaWiki Thumb.php Remote Command Execution

MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5 and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote unauthenticated users to execute arbitrary commands via shell metacharacters. If no target file is specified this module will attempt to log in with the provided credentials to upload a file (.DjVu) to use for exploitation.

Dlink DIR-615 Hardware Version E4 Firmware Verion 5.10 CSRF Vulnerability

This modem's web application suffers from Cross-site request forgery through which attacker can manipulate user data via sending him malicious craft url. The modem's application does not use any security token to prevent it against CSRF. The proof of concept (PoC) and exploit can be used to change the user password.

Recent Exploits: