header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Hailboards v1.2.0 (phpbb_root_path) Remote File Include Exploit

This exploit takes advantage of a vulnerability in Hailboards v1.2.0 where it allows remote file inclusion. By including a malicious file through the 'phpbb_root_path' parameter, an attacker can execute arbitrary code on the target system. The exploit code is provided in the given link.

mp3info SEH exploit

The process memory region starts with a null byte but exploitation is still possible because of the little endian architecture provided that the return address gets placed at the end of the buffer, this however confines us in the tiny 4-byte area after pop/pop/retn. Using a couple of trampolines, I jumped back to the beginning of the buffer which is 533 bytes, enough to fit a calc payload.

ZoneAlarm Security Suite Buffer Overflow Vulnerability

ZoneAlarm Security Suite is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input when performing virus scans on long directory paths. Remote attackers may leverage this issue to execute arbitrary code with SYSTEM-level privileges and gain complete access to the vulnerable computer. Failed attacks will cause denial-of-service conditions.

ExoPHPDesk <= 1.2.1 (faq.php) Remote SQL Injection Vulnerability

This exploit allows an attacker to perform a remote SQL injection attack on ExoPHPDesk version 1.2.1 through the faq.php file. By manipulating the 'id' parameter in the URL, an attacker can execute arbitrary SQL queries and potentially gain unauthorized access to the database.

Michelle’s L2J Dropcalc

The vulnerability allows an attacker to perform SQL injection attacks on the target website. By manipulating the 'username' and 'token' parameters in the URL, an attacker can execute arbitrary SQL queries and retrieve sensitive information from the database. The example provided demonstrates how to obtain a player's username, password, and even the MYSQL root password.

Recent Exploits: