header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Badblue 2.55 Web Server remote buffer overflow

This is an exploit for a remote buffer overflow vulnerability in Badblue 2.55 Web Server. The vulnerability allows an attacker to execute arbitrary code on the target system. The exploit sends a specially crafted HTTP request to the server, triggering the buffer overflow and gaining control over the server.

Einstein v1.01 Local Password Disclosure Exploit

This exploit targets Einstein v1.01 (and previous versions) and allows local users to disclose passwords. The exploit uses the RegOpenKeyEx and RegQueryValueEx functions to retrieve the values of the 'username' and 'password' keys in the 'Softwareeinstein' registry key. It then prints the retrieved username and password to the console.

ELECARD AVC HD PLAYER STACK BUFFER OVERFLOW

This exploit takes advantage of a stack buffer overflow vulnerability in Elecard AVC HD Player. By sending a specially crafted header, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program execution flow. The exploit code is provided in the form of a C file.

BadBlue, Easy File Sharing Remote BOverflow

The BadBlue, Easy File Sharing application is vulnerable to a buffer overflow exploit. The vulnerability allows an attacker to execute arbitrary code on the target system. The vulnerability was discovered by Andres Tarasco and an exploit was released by class101 and metasploit.com. The affected version is v2.5, with versions 2.60 and below also likely to be vulnerable. The patched version is v2.61. The exploit relies on 6 bad characters that are not properly interpreted by BadBlue. The exploit uses offsets from ext.dll and is universal. The v2.5 version can be obtained from class101.org for exploitation practices. The exploit has been tested on Windows, but should also work on Linux.

Recent Exploits: