header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

MS10-054 Proof Of Concept by Laurent Gaffie

This is a proof of concept for MS10-054 vulnerability. It is a remote code execution vulnerability in Microsoft Windows SMB Client. An attacker could exploit this vulnerability by convincing a user to connect to a malicious SMB server or by tricking a user into clicking on a specially crafted link. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with the privileges of the user.

PHPKick v0.8 statistics.php SQL Injection

This exploit allows an attacker to perform SQL injection on the statistics.php file in PHPKick v0.8. It works regardless of the PHP security settings, including magic_quotes and register_globals. This exploit is for educational purposes only and should not be used without permission. The exploit was found by garwga (ICQ#:453-144-667).

FathFTP 1.8 (SEH) DeleteFile ActiveX Buffer Overflow

This exploit targets a buffer overflow vulnerability in FathFTP 1.8. By sending a specially crafted request to the vulnerable software, an attacker can overwrite the SEH record and execute arbitrary code. The exploit has been tested on Windows XP SP3 with Internet Explorer 6.

HP OpenView NNM OvJavaLocale Buffer Overflow Vulnerability

There is a buffer overflow vulnerability in the webappmon.exe CGI application included with HP OpenView NNM. This bug can be exploited by sending a cookie header with a maliciously crafted OvJavaLocale value. Code execution is likely achievable in a reliable way.

Avast! Internet Security 5.0 ‘aswFW.sys’ kernel driver IOCTL Memory Pool Corruption

The IOCTL call 0x829C0964(IOCTL_ASWFW_COMM_PIDINFO_RESULTS) of 'aswFW.sys' kernel driver Shiped with 'Avast! Internet Security 5.0' uses the user controlled First 4 bytes value To allocate a NonPagedPool without any value range checking then an integer overrun occurs. If 'aswFW.sys' received a first 4 bytes about to '0xFFFFFFFF' with an Irp then an invalid Sized Memory Pool allocated. After the invalid allocation, the kernel driver copys user controlled buffer into '[allocated pool+84h]' with too large copy length '0FFFFFFFFh' then the Memory Pool corrupted.

SigPlus Pro v3.74 ActiveX Signature Capture LCDWriteString() Remote BoF JIT Spray – aslr/dep bypass

The exploit involves spraying the JIT memory pages with nops + egghunter combined with a call to VirtualProtect() to mark the newly found shellcode as executable and then jumping to it. By spraying so many pages, the exploit becomes reliable working 9/10 times.

Recent Exploits: