header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

r57phpbb.pl – phpBB v<=2.06 search_id sql injection exploit (POC version)

This is a proof-of-concept exploit for a SQL injection vulnerability in phpBB version <=2.06. By manipulating the search_id parameter, an attacker can execute arbitrary SQL statements. The exploit retrieves the MD5 hash for a user with a specific user_id.

Mozilla (Firefox<=v1.04) InstallVersion->compareTo Remote Code Execution Exploit

This exploit allows remote code execution in Mozilla Firefox version 1.04 and below. It takes advantage of a vulnerability in the InstallVersion->compareTo function.

Lyris ListManager Attachment SQL Injection (MSSQL)

This module exploits a SQL injection flaw in the Lyris ListManager software for Microsoft SQL Server. This flaw allows for arbitrary commands to be executed with administrative privileges by calling the xp_cmdshell stored procedure. Additionally, a window of opportunity is opened during the ListManager for MSDE install process; the 'sa' account is set to the password 'lminstall' for a 5-10 minute period. After the installer finishes, the password is permanently set to 'lyris' followed by the process ID of the installer (a 1-5 digit number).

Website Baker 2.6.0 Login Bypass / Remote Command Execution

This exploit allows an attacker to bypass the login functionality in Website Baker version 2.6.0 and execute remote commands. It works when magic_quotes_gpc is turned off. The attacker needs to launch the exploit from Apache, fill in the requested fields, and then execute the commands.

Hard to exploit vulnerability

The exploit code provided in the text is a proof of concept for a memory corruption vulnerability. The code attempts to write a pointer to a specific memory location, but due to the limitations of the controlled length, it chooses a different memory address. The code has been tested on multiple systems, with a success rate of only 5 out of 10+. The author mentions that this vulnerability can be avoided, but triggers a segfault instead.

Crafted Metafile (WMF) Denial of Service Vulnerability

The crafted metafile (WMF) crashes Windows Explorer when viewed. The issue occurs when the 'mtNoObjects' field in the Metafile header is set to 0x0000. This code was tested on Windows 2000 server SP4 and does not occur with the hotfix for GDI (MS05-053) installed.

MSDTC remote PoC exploit

This is a proof of concept exploit for the MSDTC (Microsoft Distributed Transaction Coordinator) vulnerability. It allows remote attackers to execute arbitrary code on a vulnerable Windows system.

Mambo <= 4.5.2 Globals overwrite / remote commands execution

This exploit allows an attacker to overwrite global variables in Mambo version 4.5.2, leading to remote command execution. The exploit was coded by rgod and can be launched from Apache. The attacker needs to fill in the requested fields before executing the exploit.

Recent Exploits: