header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

.m3u File Local Stack Overflow Exploit (SEH) Full Rewrite

This exploit targets a local stack overflow vulnerability in the Millenium MP3 Studio product. The vulnerability is triggered by opening a specially crafted .m3u file. The exploit uses SEH (Structured Exception Handling) overwrite technique to gain control of the program flow. It achieves this by overwriting the SEH record with a custom address, which will be executed when an exception occurs. This allows an attacker to execute arbitrary code on the target system.

Microsoft Jet (msjet40.dll) Reverse Shell Exploit

This exploit takes advantage of a vulnerability in the Microsoft Jet database engine (msjet40.dll) to execute a reverse shell. It is based on an exploit written by S.Pearson and coded by Tal Zeltzer. The exploit uses a return address of 0x77F51B93, which is the address of 'jmp edx' in ntdll.dll. The exploit includes a reverse connect shellcode from Metasploit.

(.mpf /.m3u File) Local Stack Overflow Exploit (SEH) #1

This exploit targets a vulnerability in the Millenium MP3 Studio software where a stack overflow can occur when processing .mpf or .m3u files. The exploit takes advantage of the SEH (Structured Exception Handling) mechanism to gain control of the program. The exploit is designed to work on Windows XP SP3.

Inout Adserver (id) Remote SQL injection

The Inout Adserver software is affected by a remote SQL injection vulnerability. An attacker can exploit this vulnerability by sending a specially crafted request to the 'ppc-add-keywords.php' script, with a malicious SQL query in the 'id' parameter. Successful exploitation of this vulnerability allows the attacker to retrieve sensitive information from the database, such as usernames and passwords of users and publishers. This vulnerability can be exploited by authenticated users who have created an advertiser account on the targeted website.

Microsoft Jet (msjet40.dll) Exploit

Simple exploit based upon Hexview's advisory released 01/04/2005. Should invoke Calc.exe when opened. In the main, this vulnerability is very simple to exploit although a little work is required to finally get to our shellcode. As per the original advisory, insufficient data validation is not performed when msjet40.dll parses a database file. Accordingly, by modifying parts of a .mdb database file, we can eventually gain control of the EIP.

ONG_BAK v0.9

This exploit targets a vulnerability in the BlueZ Bluetooth stack in Linux kernel version 2.6.11.4-20a-default. It allows an attacker to gain root privileges on the targeted system. The exploit works by finding a suitable value for the ECX register and then launching the exploit. The exploit has been tested on kernel version 2.6.4-52-default as well. The exploit uses a trampoline at memory address 0x804869c.

Scripteen Free Image Hosting Script V2.3 Insecure Cookie Handling

The Scripteen Free Image Hosting Script V2.3 is vulnerable to insecure cookie handling, which can allow an attacker to hijack user sessions and gain unauthorized access to the website. This vulnerability occurs when the application does not properly handle session cookies, allowing an attacker to intercept and modify them. This can lead to various security risks, such as session hijacking, identity theft, and unauthorized access to user accounts.

Recent Exploits: