header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Pinnacle Studio 12 “Hollywood FX Compressed Archive” (.hfz) directory traversal vulnerability poc

The .hfz files in Pinnacle Studio 12 can be used to overwrite files on the target system or place scripts in Startup folders by directory traversal attacks. The InstallHFX.exe decompresses them with no prompts.

Ethereal 3G-A11 remote buffer overflow PoC exploit

This is a proof-of-concept exploit for a remote buffer overflow vulnerability in Ethereal 3G-A11. The exploit is designed to crash the vulnerable software by sending a specially crafted packet. The vulnerability allows an attacker to execute arbitrary code on the target system. The exact details of the vulnerability and the associated CVE are not provided in this code snippet.

ipsec-tools racoon frag-isakmp DoS POC

This is a proof of concept (POC) exploit for a Denial of Service (DoS) vulnerability in the ipsec-tools racoon service. The vulnerability allows an attacker to send a specially crafted packet to the service, causing it to crash or become unresponsive. The exploit takes advantage of a flaw in the handling of IKE fragmentation payloads, which can be used to exhaust system resources and disrupt the normal operation of the service. This POC has been tested on ipsec-tools-0.7.1.

Java SE Runtime Environment – JRE 6 Update 13 Multiple Vulnerabilities

This exploit targets the Java SE Runtime Environment version 6 Update 13. It allows for remote .jnlp execution and stack-based buffer overflow. The exploit takes advantage of unsafe registry keys and objects with unsafe properties. It has been tested on Windows XP Professional SP3 with Internet Explorer 8.

Mini-stream ASX to MP3 Converter 3.0.0.7 .ASX File (HREF) Local Buffer Overflow Exploit

This exploit takes advantage of a buffer overflow vulnerability in Mini-stream ASX to MP3 Converter 3.0.0.7. By providing a specially crafted .ASX file with a long HREF value, an attacker can overflow the buffer and execute arbitrary code. This exploit has been tested on Windows XP SP2.

Recent Exploits: