header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Soritong MP3 Player 1.0 (SKIN) Local Stack Overflow PoC (Seh)

This is a proof-of-concept exploit for a local stack overflow vulnerability in Soritong MP3 Player 1.0. The exploit triggers a stack overflow by sending a specially crafted skin file. This vulnerability can be exploited to execute arbitrary code or crash the program.

Super Fun 2.6.30+/RHEL5 2.6.18 Local Kernel Exploit in /dev/net/tun

This exploit takes advantage of a vulnerability in the Linux kernel version 2.6.30+ or RHEL5 2.6.18, specifically in the /dev/net/tun module. It allows for a null pointer dereference directly to arbitrary code execution. Additionally, it bypasses the mmap_min_addr protection via a SELinux vulnerability. The exploit was originally deemed unexploitable at the source level but due to gcc optimizations, it becomes exploitable. It is important to note that having SELinux enabled actually increases the risk against a large class of kernel vulnerabilities.

Live For Speed 2 Version Z (.mpr ) Buffer Overflow Exploit (SEH)

This exploit takes advantage of a buffer overflow vulnerability in Live For Speed 2 Version Z (.mpr) file format. The exploit allows an attacker to execute arbitrary code by overflowing the SEH (Structured Exception Handler) in the application. The original exploit can be found at http://www.milw0rm.com/exploits/9142. The exploit was modified by His0k4.

Live For Speed 2 Version Z .Mpr Local buffer Overflow Exploit

By supplying a few bytes (0xEF 0xEF 0xEF) we can then manipulate the the registers taking full control over the application. A heap overflow occurred when manually testing lfs2. After overwriting the exception handler, there would only be 72 bytes left for the shell code to gain execution.

Recent Exploits: