header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

COWON America jetCast 2.0.4.1109 (.mp3) local heap buffer overlow exploit (xp/sp3)

The exploit allows an attacker to pass an overlong string as an id3 tag, causing a heap buffer overflow. By doing so, the attacker can redirect the program to a specific address in memory and execute arbitrary code.

Soulseek Remote Distributed Search Code Execution

The Soulseek client allows distributed file search to one person, everyone, or in a specific Soulseek IRC channel, allowing a user to find the files they want. However, this feature is vulnerable to a remote SEH overwrite to a specific user or even to a whole Soulseek IRC channel.

Winamp <= 5.55 (MAKI script) Universal Integer Overflow Exploit

This exploit targets a universal integer overflow vulnerability in Winamp version 5.55. By placing a specially crafted MAKI script file in the appropriate directory and running Winamp, an attacker can trigger the integer overflow and potentially execute arbitrary code.

Winamp <= 5.55 (MAKI script) Universal Seh Overwrite Exploit

This is a universal SEH overwrite exploit for Winamp version 5.55 and below. It allows an attacker to execute arbitrary code on a vulnerable system. More details about the vulnerability can be found in the advisory provided. The exploit code was developed by His0k4. The exploit has been tested on Windows XP Pro SP3 (EN).

SentinelLM, UDP License Service Stack Overflow

The exploit targets the UDP License Service of SentinelLM. It overflows the stack by sending a buffer of around 3900 bytes. The overflow occurs at buffer[1035] and reaches eip when the buffer autogrows at around buffer[3940]. The exploit may need to be sent twice for it to work. It includes a popopret outside of a loaded module for SP2 and 2k3 targets. The offset has been tested on SP2 and 2003 ENGLISH. The exploit code is compiled for Win32 (MSVC, cygwin) and Linux (FreeBSD, etc.).

Recent Exploits: