header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VideoLAN VLC MKV Memory Corruption

This module exploits an input validation error in VideoLAN VLC < 1.1.7. By creating a malicious MKV or WebM file, a remote attacker could execute arbitrary code. NOTE: As of July 1st, 2010, VLC now calls SetProcessDEPPoly to permanently enable NX support on machines that support it.

Remote Denial of Service in vsftpd

This is a proof-of-concept code for exploiting the CVE-2011-0762 vulnerability in vsftpd. The vulnerability allows remote attackers to cause a denial of service (DoS) by sending a specially crafted command to the FTP server. The affected version is 2.3.2, and the fix is available in version 2.3.4.

DOS LOGIN Quick ‘n Easy FTP Server 3.2

This exploit allows an attacker to perform a Denial of Service (DOS) attack by sending a large buffer of random characters as the username and password to the Quick 'n Easy FTP Server 3.2. This causes the server to become unresponsive and deny service to legitimate users.

Developers should not rely on the stickiness of /tmp on Red Hat Linux

Unprivileged users can effectively remove the sticky-bit from the system /tmp directory, making it unsafe to rely on the stickiness of /tmp on Red Hat Linux systems.

AutoPlay v1.33 (autoplay.ini) Local Buffer Overflow Exploit (SEH)

The program suffers from a buffer overflow vulnerability when opening autorun file (.ini), as a result of adding extra bytes to parts of the edited file, giving the attackers the possibility for arbitrary code execution on the affected system. Also, the buffer overflow vulnerability allows the attacker to bypass Structured Exception Handling (SEH) protection mechanism.

MS Windows Server 2003 AD Pre-Auth BROWSER ELECTION Remote Heap Overflow

Mrxsmb.sys, around BowserWriteErrorLog+0x175, while trying to copy 1go from ESI to EDI ...Code will look something like this:if ((Len + 1) * sizeof(WCHAR)) > TotalBufferSize) { Len = TotalSize/sizeof(WCHAR) - 1; }-1 causes Len to go 0xFFFFFFFFFeel free to reuse this code without restrictions...

xRadio 0.95b (.xrl) Local Buffer Overflow (SEH)

xRadio is affected by a stack-based buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Successful exploitation of the vulnerability allows an attacker to execute arbitrary code. Other versions are also affected but have a different trigger.

Recent Exploits: