header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ArGoSoft Ftp Server remote overflow exploit

ArGoSoft Ftp Server has a remote overflow vulnerability that allows an attacker to overwrite the eip register and potentially execute arbitrary code. The vulnerability exists in versions 1.4.2.29 and prior. The exploit code demonstrates the vulnerability by overwriting the eip register with a null byte. By manipulating the eip register, an attacker can redirect the program flow to execute malicious code. The exploit code is compiled with Visual C++ 6. The vulnerability was reported to ArGoSoft and a patched version was released.

phpBB <=2.0.13 'downloads.php' Mod

This script exploits a code injection vulnerability in the 'downloads.php' module of phpBB version <= 2.0.13. By manipulating the 'user_id' parameter, an attacker can execute arbitrary SQL queries and retrieve sensitive information, such as the MD5 hash of the user's password.

AudioPLUS 2.00.215 (.m3u / .lst File) Local buffer Overflow (seh)

The exploit is for AudioPLUS version 2.00.215 and it targets a buffer overflow vulnerability in the .m3u and .lst file formats. The exploit uses a specific sequence of characters to overflow the buffer, overwrite the structured exception handler (SEH) with a specific address, and execute shellcode. It has been tested on Windows XP Pro SP2 (EN).

linux kernel <=2.6.10(2.6.x) DOS exploit

This exploit targets the linux kernel versions up to 2.6.10 (2.6.x) and causes a denial of service (DOS) by creating multiple files and locking them. It is written by ChoiX and belongs to the uKt Research team. The exploit starts by creating files with specific names and then locks them. It continues to create files until the system crashes.

HT-MP3Player 1.0 (.ht3) Universal Buffer Overflow (SEH)

The HT-MP3Player 1.0 (.ht3) application is vulnerable to a universal buffer overflow, specifically a stack-based buffer overflow. This vulnerability can be exploited to execute arbitrary code by crafting a malicious .ht3 file and triggering the overflow. The exploit takes advantage of a SEH (Structured Exception Handler) overwrite to gain control of program execution flow. The payload used in the exploit is a shellcode that executes the 'calc' program. This exploit has been tested on Windows XP Pro SP3 (EN).

Recent Exploits: