Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

dSMTP – SMTP Mail Server 3.1b Linux Remote Root Format String Exploit

This exploit targets the "xtellmail" command in dSMTP - SMTP Mail Server 3.1b on Linux. It uses a format string vulnerability to gain remote root access. The exploit sends a specially crafted packet to the server, overwriting the return address and executing shellcode to spawn a reverse shell. This allows the attacker to gain full control of the server.

Mysql 3.23.x/4.0.x remote exploit

This is a proof of concept exploit for a remote code execution vulnerability in MySQL versions 3.23.x and 4.0.x. The exploit uses the jmp *eax technique. The exploit was discovered by bkbll (bkbll cnhonker.net, bkbll tom.com) on September 12, 2003. The exploit allows an attacker to execute arbitrary code on a vulnerable MySQL server. It is advised not to distribute this exploit.

GlobalScape Secure FTP Server Buffer Overflow

This exploit code is for a buffer overflow vulnerability in GlobalScape Secure FTP Server. The code is written in Python and is designed to overwrite the EIP (Extended Instruction Pointer) register. It sends a malicious buffer to the server and then connects to port 4444 on the victim machine. This code can be used to gain unauthorized access to the victim machine.

Setuid ARPUS/ce exploit

This code is a setuid ARPUS/ce exploit that can be used to escalate privileges on a system. It overwrites the /etc/ld.so.preload file, which can severely impact the system. The exploit takes advantage of a vulnerability in the ce program, which drops privileges under certain conditions. By exporting a faulty display, the program does not drop privileges, allowing the attacker to gain root access.

Quiksoft EasyMail 6 (AddAttachment) Remote Buffer Overflow Exploit

This exploit takes advantage of a remote buffer overflow vulnerability in Quiksoft EasyMail 6. The vulnerable method is AddAttachment. The latest version of the software does not support this method. The exploit was created out of boredom and interest sparked by a similar post. For more details, refer to the advisory at http://www.bmgsec.com.au/advisory/48/.

Recent Exploits: