header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adobe Photoshop Elements 8.0 Active File Monitor Service Bad Security Descriptor Local Elevation Of Privileges

The "Adobe Active File Monitor V8" service is installed with an improper security descriptor. A malicious user of the Users group (which on xp means a "limited account") can stop the service, then invoke the "sc config" command to replace the binary path with a value of choice, then restart the service to run the command with SYSTEM privileges.

Mysql 3.23.x/4.0.x remote exploit

This is a proof of concept exploit for a remote code execution vulnerability in MySQL versions 3.23.x and 4.0.x. The exploit uses the jmp *eax technique. The exploit was discovered by bkbll (bkbll cnhonker.net, bkbll tom.com) on September 12, 2003. The exploit allows an attacker to execute arbitrary code on a vulnerable MySQL server. It is advised not to distribute this exploit.

GlobalScape Secure FTP Server Buffer Overflow

This exploit code is for a buffer overflow vulnerability in GlobalScape Secure FTP Server. The code is written in Python and is designed to overwrite the EIP (Extended Instruction Pointer) register. It sends a malicious buffer to the server and then connects to port 4444 on the victim machine. This code can be used to gain unauthorized access to the victim machine.

joomla component com_mytube (user_id) Blind SQL Injection Vulnerability

This vulnerability allows an attacker to execute SQL queries on the database without the need for authentication. By injecting malicious SQL code into the 'user_id' parameter, an attacker can retrieve sensitive information from the database.

Setuid ARPUS/ce exploit

This code is a setuid ARPUS/ce exploit that can be used to escalate privileges on a system. It overwrites the /etc/ld.so.preload file, which can severely impact the system. The exploit takes advantage of a vulnerability in the ce program, which drops privileges under certain conditions. By exporting a faulty display, the program does not drop privileges, allowing the attacker to gain root access.

Recent Exploits: