Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 103 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Microsoft Windows win32k!xxxRealDrawMenuItem() missing HBITMAP bounds checks

The win32k.sys module in Microsoft Windows 7 does not perform proper bounds checks on HBITMAP handles, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka a 'Windows Kernel Elevation of Privilege Vulnerability'.

Perl Buffer Overflow Exploit

This script demonstrates a buffer overflow vulnerability in Perl. The script takes a target IP as input and creates a buffer with a length of 4100 bytes. It also creates a longer buffer with a length of 1999999 bytes. The script then attempts to exploit the buffer overflow by overwriting the return address with a specific value. The shellcode is also included in the script to execute arbitrary code.

Vulnerability in modem Arescom NetDSL-1000

If you flood the telnet configuration a couple dozen times with long strings, eventually the telnetd service flat out dies. Routing functions of the NetDSL continue to work fine as before. It is unknown whether only the telnetd service is affected, other means of remote configuration may have become unavailable as well.

Microsoft Windows CreateWindow function callback vulnerability

A crash due to an invalid read in the Windows kernel can be reliably leveraged into privileged code execution resulting in a privilege escalation local vulnerability. This happens because special values of 'hParent' where not sufficiently taken into account when patching 'xxxCreateWindowsEx' on MS010-032.

Recent Exploits: