header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GeoVision LiveX_v8200 ActiveX Control (LIVEX_~1.OCX) remote file corruption poc

This proof-of-concept (PoC) code connects to a live demo server and replaces system.ini with jpeg content. It is working against IE8b/xpsp3, safe for scripting and for initialization. LiveX_v7000 and LiveX_v8120 with clsids {DA8484DE-52DB-4860-A986-61A8682E298A} and {F4421170-DB22-4551-BBFB-FFCFFB419F6F} have the same SnapShotToFile() and SnapShotX() methods.

TPTEST <= 3.1.7 (maby also 5.0.2?) Stackbased Buffer Overflow POC

TPTEST is vulnerable to a stack-based buffer overflow vulnerability. This vulnerability can be exploited by sending a specially crafted STATS packet with an overly long email field to the server. This can allow an attacker to execute arbitrary code on the vulnerable system.

FreeBSD (7.0-RELEASE) telnet daemon local privilege escalation

There is a rather big bug in the current FreeBSD telnetd daemon. The environment is not properly sanitized when execution /bin/login, what leads to a (possible) remote root hole. The telnet protocol allows to pass environment variables inside the telnet traffic and assign them to the other side of the tcp connection. The telnet daemon of FreeBSD does not check for LD_* (like LD_PRELOAD) environment variables prior to executing /bin/login. So passing an environment variable with the identifier LD_PRELOAD and the value of a precompiled library that is on the filesystem of the victims box that includes malicious code is possible. When /bin/login is executed with the user id and group id 0 ('root') it preloads the library that was set by remote connection through a telnet environment definition and executes it. It is unlikely that this bug can be exploited remotely but is not impossible. An attacker could f.e. upload a malicious library using ftp (including anonymous ftp users), nfs, smb or any other (file) transfer protocol. One scenario to exploit the bug remotely would be a ftp server running beside the telnet daemon serving also anoynmous users with write access. Then the attacker would upload the malicious library and defines the LD_PRELOAD variable to something similar to /var/ftp/mallib.so to gain remote root access.

Remote FD / SQL Injection Exploit

BlogWrite 0.91 is vulnerable to a Remote FD / SQL Injection Exploit. This exploit uses two SQL Injections, the first one is /[path]/print.php?id=-1' union all select 1,2,concat(user,0x3a,pass),4,5,6,0,8 from auth where id='1 and the second one is /path]/print.php?id=-1' union all select 1,2,load_file('lf'),4,5,6,0,8 from auth where id='1. However, the query is protected and the author was not able to bypass it.

ea-gBook 0.1 Remote Command Execution with RFI (c99) Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable ea-gBook 0.1 installation. The vulnerability exists due to the 'inc_ordner' parameter in the 'index_inc.php' script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing an arbitrary file from a remote host.

Recent Exploits: