header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SentinelLM UDP Buffer Overflow

This module exploits a simple stack buffer overflow in the Sentinel License Manager. The SentinelLM service is installed with a wide selection of products and seems particular popular with academic products. If the wrong target value is selected, the service will crash and not restart.

McAfee Remediation Client ActiveX Control Buffer Overflow

This module exploits a stack buffer overflow in McAfee Remediation Agent 4.5.0.41. When sending an overly long string to the DeleteSnapshot() method of enginecom.dll (3.7.0.9) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.

SnackAmp 3.1.3B Malicious SMP Buffer Overflow Vulnerability (SEH – DEP BYPASS)

This exploit targets the SnackAmp 3.1.3B software and utilizes a buffer overflow vulnerability to execute arbitrary code. It bypasses both SEH and DEP protections. The exploit payload is a shellcode that opens the calculator application on the target system.

Buffer Overflow in PhotoFiltre Studio X

This is a local buffer overflow exploit for PhotoFiltre Studio X .tif files. It allows an attacker to overwrite the seh handler with a pop pop ret instruction and overwrite the next seh with a jmp ebp instruction. The exploit then finds the exact location ebp points to and writes a jmp 0x40 bytes instruction. This exploit does not have space for shellcode, so a jmp ebp option is chosen instead of an egghunter. The exploit is designed for MS Windows xp pro sp3.

Rising Online Virus Scanner ActiveX Control DoS (Stack overflow)

This exploit takes advantage of a stack overflow vulnerability in the Rising Online Virus Scanner ActiveX Control. By passing a large string as an argument to the 'Scan()' function, it causes the control to crash, resulting in a denial of service condition.

Multiple Buffer Overflow Vulnerabilities in LBreakout2

Multiple buffer overflow vulnerabilities exist in the environment variable handling of LBreakout2. The issue is due to an insufficient boundary checking of certain environment variables used by the affected application. A malicious user may exploit this condition to potentially corrupt sensitive process memory in the affected process and ultimately execute arbitrary code with the privileges of the game process.

Recent Exploits: