header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Shout! (content.php) Blind Sql Injection Vulnerability

This vulnerability allows an attacker to perform Blind Sql Injection on the Shout! Script. By modifying the 'id' parameter in the content.php URL, the attacker can execute arbitrary SQL queries and retrieve sensitive information from the database. The exploit examples provided demonstrate how to determine the version of the database server by leveraging the boolean-based blind SQL injection technique.

CA BrightStor ARCserve Backup Agent for SQL – dbasqlr.exe

The CA BrightStor ARCserve Backup Agent for SQL (dbasqlr.exe) is vulnerable to a buffer overflow. An attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user running the affected application.

South River Technologies WebDrive Service Bad Security Descriptor Local Privilege Escalation

This module exploits a privilege escalation vulnerability in South River Technologies WebDrive. Due to an empty security descriptor, a local attacker can gain elevated privileges. Tested on South River Technologies WebDrive 9.02 build 2232 on Microsoft Windows XP SP3. Vulnerability mitigation featured.

Windows Live Messenger 2009 ActiveX Heap Overflow PoC

This exploit targets the Windows Live Messenger 2009 ActiveX component. It causes a heap overflow in the RichUploadControlContextData property of the component, leading to potential code execution or denial of service. The exploit is written in VBScript and sets a specially crafted value to the property.

Recent Exploits: