header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Explorer OWC Remote Code Execution

This exploit allows remote attackers to execute arbitrary code on a vulnerable system using Internet Explorer with OWC installed. The payload used in this exploit is a Metasploit shellcode that executes the calc.exe calculator. The payload is converted to UTF-16 encoding before being sent to the target system.

FlyHelp .CHM File Buffer Overflow

This exploit demonstrates a buffer overflow vulnerability in FlyHelp .CHM File. It allows an attacker to execute arbitrary code by providing a specially crafted .CHM file. The vulnerability is caused by a lack of proper input validation when parsing the .CHM file, which allows an attacker to overwrite the stack and control the program execution flow.

Includer CGI <= 1.0 Remote Command Execution

This exploit allows an attacker to execute arbitrary commands on the target system by exploiting a vulnerability in the Includer CGI <= 1.0. The vulnerability is due to the improper use of the 'Open' function. By sending a specially crafted request, an attacker can inject arbitrary commands and execute them on the target system.

FireFox 3.5 Heap Spray

This exploit targets Firefox version 3.5 and uses heap spray technique to execute malicious code. It was discovered by Simon Berry-Bryne and coded in Perl by netsoul from ALTO PARANA - Paraguay. The exploit listens on port 8080 and sends a payload. After 30 seconds, it expects a connection on port 5500 using netcat.

Microsoft WordPerfect Document Converter Buffer Overflow Exploit MS03-036

This exploit targets the Microsoft WordPerfect Document Converter. It allows an attacker to overflow the buffer and execute arbitrary code. The exploit has several targets, and the return address can be found using the 'findhex' command with the DLL name and either FF D4 (call esp) or FF E4 (jmp esp) as parameters. The vulnerability was discovered by Yuji 'The Ninja' Ukai, and the 'findhex' tool was developed by Jason Jordan. The shellcode used in the exploit was taken from Metasploit. The exploit itself was developed by valgasu and RstAck.

Real Helix DNA RTSP and SETUP request handler vulnerabilities

Two vulnerabilities have been found in the Real Helix DNA streaming server. The first vulnerability occurs during a 'RTSP' request handling, where an empty 'DataConvertBuffer' parameter can cause the server to raise an exception, leading to a crash. The second vulnerability occurs during the 'SETUP' request handling, where a missing byte in the request line can cause the process to crash with an access violation.

Recent Exploits: