header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FlashGameScript <= 1.7 (member.php)($user) SQL-Injection Exploit

This exploit allows an attacker to execute arbitrary SQL queries through the 'user' parameter in the 'member.php' file of FlashGameScript versions 1.7 and prior. The parameter is passed straight to the query without being filtered, allowing the attacker to manipulate the query and extract sensitive information from the database.

Chilkat Software Chilkat Zip ActiveX Component (ChilkatZip2.dll v. 12.4.2.0) ‘SaveLastError()’ and ‘WriteExe()’ Insecure Methods

The 'SaveLastError()' and 'WriteExe()' methods in Chilkat Zip ActiveX Component (ChilkatZip2.dll v. 12.4.2.0) allow an attacker to overwrite the system.ini file, potentially causing the system to not restart properly. This exploit is for educational purposes only and should be used at your own risk.

Remote Exploit for Hafiye-1.0

Remote exploit for Hafiye-1.0 that takes advantage of the Terminal Escape Sequence Injection Vulnerability. Written by Serkan Akpolat. The exploit allows an attacker to inject escape sequences into the terminal, potentially leading to unauthorized actions or information disclosure. The exploit provides various escape sequences that can be used to change the title bar text, ring the bell, create a hidden prompt to create a file in /root, etc.

GameSiteScript (Profile)($id) SQL-Injection Exploit

This exploit allows an attacker to perform SQL injection in the GameSiteScript profile page. The vulnerability was discovered by Xenduer77 on July 7th, 2007. The vulnerability occurs because the input parameter {$id} is passed straight to the query without being filtered.

NeoTracePro 3.25 ActiveX Control “TraceTarget()” b0f [NeoTraceExplorer.dll] Remote 0-day Exploit

This exploit targets a buffer overflow vulnerability in the TraceTarget() method of the NeoTracePro 3.25 ActiveX Control. By passing a large string (~486 bytes), an attacker can execute remote commands on the target system. The vulnerability was discovered by A. Alejandro Hernández and can be exploited due to the lack of boundary checking in the TraceTarget() method. This vulnerability was previously reported but no exploit was released. The exploit has been tested on Windows XP SP2 with Internet Explorer 7.0.5730.11 and NeoTracePro 3.25.

SAP DB 7.4 WebTools Remote SEH overwrite exploit

This exploit targets SAP DB 7.4 WebTools and allows for remote SEH overwrite. By sending a large amount of bytes to the server, the SEH (Structured Exception Handling) is overwritten, triggering an exception and executing shellcode. The exploit was discovered by NGSSoftware Insight Security Research and the exploit writer is Heretic2.

Drupal 7.x Services Module Remote Code Execution

This exploit allows an attacker to execute arbitrary code on a Drupal 7.x website that has the Services module installed. The exploit takes advantage of a SQL injection vulnerability in the module's code to gain administrative access and then writes a PHP file to the server that can be used to execute arbitrary commands.

LimeSurvey (PHPSurveyor) RFI (Remote File Include) Vulnerability

The LimeSurvey (PHPSurveyor) script version 1.49RC2 is vulnerable to a Remote File Include (RFI) vulnerability. The vulnerability exists in multiple files, including /admin/classes/pear/OLE/PPS/File.php, /admin/classes/pear/OLE/PPS/Root.php, /admin/classes/pear/Spreadsheet/Excel/Writer.php, /admin/classes/pear/OLE/PPS.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Format.php, and /admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php. An attacker can exploit this vulnerability by including a remote file using the homedir parameter in the URL.

HP Digital Imaging (hpqvwocx.dll v. 2.1.0.556) “SaveToFile()” Insecure Method

This exploit overwrites the system.ini file, potentially causing the PC to not restart. It is a control marked as not safe for script or initialization, but implements object and data safety. It has been tested on Windows XP Professional SP2 with Internet Explorer 7.

Recent Exploits: