This exploit allows an attacker to execute arbitrary SQL queries through the 'user' parameter in the 'member.php' file of FlashGameScript versions 1.7 and prior. The parameter is passed straight to the query without being filtered, allowing the attacker to manipulate the query and extract sensitive information from the database.
The 'SaveLastError()' and 'WriteExe()' methods in Chilkat Zip ActiveX Component (ChilkatZip2.dll v. 12.4.2.0) allow an attacker to overwrite the system.ini file, potentially causing the system to not restart properly. This exploit is for educational purposes only and should be used at your own risk.
Remote exploit for Hafiye-1.0 that takes advantage of the Terminal Escape Sequence Injection Vulnerability. Written by Serkan Akpolat. The exploit allows an attacker to inject escape sequences into the terminal, potentially leading to unauthorized actions or information disclosure. The exploit provides various escape sequences that can be used to change the title bar text, ring the bell, create a hidden prompt to create a file in /root, etc.
This exploit allows an attacker to perform SQL injection in the GameSiteScript profile page. The vulnerability was discovered by Xenduer77 on July 7th, 2007. The vulnerability occurs because the input parameter {$id} is passed straight to the query without being filtered.
This exploit targets a buffer overflow vulnerability in the TraceTarget() method of the NeoTracePro 3.25 ActiveX Control. By passing a large string (~486 bytes), an attacker can execute remote commands on the target system. The vulnerability was discovered by A. Alejandro Hernández and can be exploited due to the lack of boundary checking in the TraceTarget() method. This vulnerability was previously reported but no exploit was released. The exploit has been tested on Windows XP SP2 with Internet Explorer 7.0.5730.11 and NeoTracePro 3.25.
This exploit targets SAP DB 7.4 WebTools and allows for remote SEH overwrite. By sending a large amount of bytes to the server, the SEH (Structured Exception Handling) is overwritten, triggering an exception and executing shellcode. The exploit was discovered by NGSSoftware Insight Security Research and the exploit writer is Heretic2.
This exploit allows an attacker to execute arbitrary code on a Drupal 7.x website that has the Services module installed. The exploit takes advantage of a SQL injection vulnerability in the module's code to gain administrative access and then writes a PHP file to the server that can be used to execute arbitrary commands.
The LimeSurvey (PHPSurveyor) script version 1.49RC2 is vulnerable to a Remote File Include (RFI) vulnerability. The vulnerability exists in multiple files, including /admin/classes/pear/OLE/PPS/File.php, /admin/classes/pear/OLE/PPS/Root.php, /admin/classes/pear/Spreadsheet/Excel/Writer.php, /admin/classes/pear/OLE/PPS.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Worksheet.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Parser.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Workbook.php, /admin/classes/pear/Spreadsheet/Excel/Writer/Format.php, and /admin/classes/pear/Spreadsheet/Excel/Writer/BIFFwriter.php. An attacker can exploit this vulnerability by including a remote file using the homedir parameter in the URL.
This exploit overwrites the system.ini file, potentially causing the PC to not restart. It is a control marked as not safe for script or initialization, but implements object and data safety. It has been tested on Windows XP Professional SP2 with Internet Explorer 7.
This exploit allows for a buffer overflow in Azure Data Expert Ultimate version 2.2.16. By sending a specially crafted request, an attacker can cause the program to execute arbitrary code.