header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

mremap missing do_munmap return check kernel exploit

This is a kernel exploit that takes advantage of the missing do_munmap return check in the mremap function. It allows an attacker to gain elevated privileges on vulnerable systems. The exploit works by exploiting a vulnerability in the mremap function of the Linux kernel, specifically in versions <= 2.2.25, <= 2.4.24, and <= 2.6.2. By exploiting this vulnerability, an attacker can execute arbitrary code with root privileges. This exploit requires the suid permission on the target binary /bin/ping. The exploit code is written in C and requires compilation with gcc. The exploit can be executed by running the compiled binary with optional arguments for suid and shell.

Lotus CMS Fraise v3.0 LFI – Remote Code Execution Exploit

The exploit takes advantage of a file inclusion vulnerability in the Lotus CMS Fraise v3.0. The vulnerability exists in lines 15-23 of the core/lib/router.php file. The CMS also allows an attacker to inject malicious content by commenting on blog posts. The exploit includes proxy support, dynamic User-agent generation, Apache access log and Lotus blog comment injection routines, and custom shell creation and deletion.

Recent Exploits: