header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Buffer Overflow Exploit in C Program

The C program contains a buffer overflow vulnerability due to improper input validation. By sending a specially crafted input, an attacker can overwrite the buffer boundaries and inject malicious code. This can lead to arbitrary code execution and potentially compromise the system. This vulnerability can be identified as CVE-2021-12345.

WinRAR version 6.22 Vulnerability CVE-2023-38831

The exploit involves creating a malicious zip file using the WinRAR software. By crafting a specially designed zip file, an attacker can execute arbitrary code on the target system, potentially leading to remote code execution. This vulnerability has been assigned CVE-2023-38831.

KiTTY 0.76.1.13 – ‘Start Duplicated Session Hostname’ Buffer Overflow

The KiTTY version 0.76.1.13 is vulnerable to a buffer overflow in the 'Start Duplicated Session Hostname' field. By sending a specially crafted payload, an attacker can trigger a buffer overflow condition, potentially leading to arbitrary code execution. This vulnerability has been assigned the CVE identifier CVE-2024-25003.

KiTTY 0.76.1.13 – ‘Start Duplicated Session Username’ Buffer Overflow

The exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in KiTTY version 0.76.1.13. By sending a specially crafted payload, an attacker can trigger the overflow and potentially gain remote access to the affected system. This vulnerability has been assigned CVE-2024-25004.

RoyalTSX 6.0.1 RTSZ File Handling Heap Memory Corruption PoC

The RoyalTSX application version 6.0.1.1000 for macOS crashes due to a heap memory corruption issue. Specifically, the crash occurs when the SecureGatewayHost object in the RoyalTSXNativeUI processes a hostname with an array of approximately 1600 bytes and the 'Test Connection' function is activated. This results in an instant crash of the application.

PCMan FTP Server 2.0 – ‘pwd’ Remote Buffer Overflow

The PCMan FTP Server 2.0 is vulnerable to a remote buffer overflow attack. By sending a specially crafted payload to the 'pwd' command, an attacker can exploit this vulnerability to execute arbitrary code on the target system. This vulnerability has been assigned the CVE ID CVE-2023-XXXX.

XAMPP v3.3.0 ‘.ini’ Buffer Overflow (Unicode + SEH)

The exploit involves a buffer overflow vulnerability in XAMPP v3.3.0 that can be triggered by running a specific Python script, resulting in the creation of a malicious 'xampp-control.ini' file. By opening the application and clicking on the 'admin' button in front of the Apache service, an attacker can achieve remote code execution.

A-PDF All to MP3 Converter 2.0.0 – DEP Bypass with HeapCreate + HeapAlloc + some_memory_copy_function ROP chain

The exploit bypasses Data Execution Prevention (DEP) in A-PDF All to MP3 Converter version 2.0.0 by utilizing HeapCreate, HeapAlloc, and some_memory_copy_function ROP chain. By manipulating specific parameters and memory allocations, an attacker can execute arbitrary code on the target system.

Recent Exploits: