header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SMBv2Header

This class represents the header of an SMBv2 packet. It contains various fields such as protocol, length, credit charge, NT status, command, credits, flags, next command, message ID, PID, TID, and session ID.

b1gbb 2.24.0 (SQL/XSS) Remote Vulnerabilities

There are remote vulnerabilities in b1gbb 2.24.0 that allow for SQL injection and XSS attacks. The SQL injection can be exploited through the 'showthread.php' and 'showboard.php' pages, allowing an attacker to retrieve sensitive information from the 'cebb_user' table. The XSS vulnerability can be exploited through the 'visitenkarte.php' page, allowing an attacker to execute arbitrary scripts in the context of the user's browser.

Excel 2003 Sp2 Remote Buffer Overflow Vulnerability

This exploit takes advantage of a remote buffer overflow vulnerability in Excel 2003 Sp2. An attacker can send a specially crafted Excel file to a victim, and when the victim opens the file, it triggers the buffer overflow, allowing the attacker to execute arbitrary code on the victim's machine. This vulnerability was discovered by ZhenHan.Liu of Ph4nt0m Security Team.

Sony Network Camera SNC-P5 v1.0 ActiveX viewer Heap Overflow PoC

This is a proof-of-concept exploit for a heap overflow vulnerability in the Sony Network Camera SNC-P5 v1.0 ActiveX viewer. By clicking the 'Click Me' button, an attacker can trigger the vulnerability and potentially execute arbitrary code on the target system. This vulnerability was discovered by /str0ke and was published on milw0rm.com on June 27, 2007.

hpqxml.dll 2.0.0.133 from HP Digital Imaging Arbitary Data Write

The saveXMLAsFile method in hpqxml.dll allows malicious users to write arbitrary data to any file on a vulnerable system. The method does not check if it is being called from the application or from a malicious user, and it does not check the file headers before writing.

Recent Exploits: