header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MySQL MaxDB Webtool Remote Stack Overflow Exploit

This exploit allows remote attackers to execute arbitrary code via a long GET request to the webtool component. The vulnerability is caused due to a boundary error within the webtool when handling requests with overly long URIs. This can be exploited to cause a stack-based buffer overflow via a specially crafted GET request.

PMsoftware mini http server remote stack overflow exploit

This exploit targets the PMsoftware Web Server version 1.0 and takes advantage of a remote stack overflow vulnerability. By sending a specially crafted HTTP request, an attacker can trigger a stack overflow and execute arbitrary code on the target system. The exploit includes a payload shellcode that opens a reverse shell on port 4444.

FTPShell Client, Name Session Stack Overflow Exploit

This exploit targets the FTPShell Client version 4.1 RC2 on Windows XP SP3. It exploits a stack overflow vulnerability in the 'Name Session' feature of the program. The exploit code contains a shellcode for executing the 'calc.exe' program. The exploit is coded by 'zec' and can be contacted at zec@bsdmail.com.

jetAudio v 7.1.9.4030 plus vx (.m3u ) Local Stack Overflow

This exploit targets the jetAudio software version 7.1.9.4030 plus vx. It utilizes a RET - Universal method to trigger a local stack overflow vulnerability. The exploit has been tested on Windows XP SP3 En. The exploit was written by corelanc0d3r and can be found at http://www.milw0rm.com/exploits/9359. The payload is prepared by creating a malicious .m3u file named 'c0d3rsploit.m3u'. The exploit includes a shellcode that executes a calc command.

Gaim 1.2.1 Stack Overflow Vulnerability

This code demonstrates a stack overflow vulnerability in Gaim 1.2.1 when processing email addresses. It causes a segfault when executing the /vuln command in a conversation. If a protocol allows a 10002-character message to go through, it also segfaults the recipient. The vulnerability is due to the stack being overwritten with 'A's and the return address of the function being set to 0x41414141.

Winamp 5.5.8.2985 (in_mod plugin) Stack Overflow

This exploit is for Winamp version 5.5.8.2985 with the in_mod plugin. It exploits a stack overflow vulnerability in the software. The exploit allows an attacker to execute arbitrary code on a Windows XP SP3 system that is fully patched but does not have ASLR or DEP bypass. The bug was found by a user on the website exploit-db.com and the proof of concept (POC) was created by fdisk. The exploit itself was developed by Mighty-D. The exploit is able to bypass certain security measures and gain control of the system.

DATAC RealWin Stack Overflow Vulnerabilities

The DATAC RealWin SCADA server package for medium/small applications is vulnerable to two stack overflow vulnerabilities. The first vulnerability occurs in the SCPC_INITIALIZE and SCPC_INITIALIZE_RF functions, where a stack-based buffer overflow is caused by the usage of sprintf(). The second vulnerability occurs in the SCPC_TXTEVENT function, where a stack-based overflow is caused by the usage of strcpy() with data supplied by the attacker.

Recent Exploits: