header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PHP Project Management <= 0.8.10 Multiple RFI / LFI Vulnerabilities

Multiple remote file inclusion (RFI) and local file inclusion (LFI) vulnerabilities in PHP Project Management version 0.8.10 and earlier allow remote attackers to execute arbitrary code or read arbitrary files via a full_path parameter in various modules.

Vanilla <= 1.1.3 Remote Blind SQL Injection Exploit

This exploit targets Vanilla versions 1.1.3, 1.1.2, and 1.0.1. It takes advantage of a vulnerability in the /ajax/sortcategories.php and /ajax/sortroles.php scripts, which are used for sorting categories and roles. These scripts do not properly sanitize user input data, allowing for SQL injection attacks. By injecting SQL code into the UPDATE query, an attacker can execute arbitrary SQL commands on the target server. The exploit requires MySQL version 4.1 or higher and magic_quotes_gpc to be turned off.

Solaris ‘EXTREMEPARR’ dtappgather Privilege Escalation

This module exploits a directory traversal vulnerability in the 'dtappgather' executable included with Common Desktop Environment (CDE) on unpatched Solaris systems prior to Solaris 10u11 which allows users to gain root privileges. dtappgather allows users to create a user-owned directory at any location on the filesystem using the 'DTUSERSESSION' environment variable. This module creates a directory in '/usr/lib/locale', writes a shared object to the directory, and runs the specified SUID binary with the shared object loaded using the 'LC_TIME' environment variable.

Recent Exploits: