header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Apple MACOS X xnu <= 1228.3.13 appletalk zip-notify remote kernel overflow PoC

This is a proof-of-concept exploit for a remote kernel overflow vulnerability in Apple MACOS X xnu version 1228.3.13. The vulnerability is related to the appletalk zip-notify functionality. The exploit takes advantage of a buffer overflow in the zip-notify functionality to execute arbitrary code on the target system.

Remote buffer overflow exploit for Medal of Honor Spearhead Dedicated Server (Linux)

This is a remote buffer overflow exploit for the Medal of Honor Spearhead Dedicated Server on Linux. It allows an attacker to execute arbitrary code on the target server.

Pixie CMS Multiple Vulnerabilities

The Pixie CMS is vulnerable to multiple vulnerabilities including Cross Site Scripting (XSS) and SQL Injection. The XSS vulnerability can be exploited by tampering with the blog post URL variables, specifically the 'x=' variable. By injecting HTML code into the page display, an attacker can redirect users to a specified URL. The SQL Injection vulnerability occurs in the 'referer' client request, allowing an attacker to manipulate the referer and perform SQL Injection attacks.

Bs.Player <= 2.34 Build 980 (.bsl) local buffer overflow 0day exploit (seh)

Overlong hostnames in bsplayer playlist files causes eax and seh handlers to be overwritten. Cannot reliably debug with olly because of code compression, just used faultmon/memdump/msfpescan and I choosed the easy/universal way with seh. There are some pop ret addresses in common among the vulnerable versions...

Chasys Media Player 1.1 .cue file Stack Overflow Exploit

This exploit targets Chasys Media Player 1.1 by exploiting a stack overflow vulnerability in the .cue file parser. The attacker can craft a specially crafted .cue file that, when opened by the vulnerable media player, will trigger the stack overflow and potentially allow the execution of arbitrary code. This exploit has been written in Ruby and can be used to gain unauthorized access to a target system.

VisualBoyAdvanced 1.7.x BufferOver Flow exploit

This is a buffer overflow exploit for VisualBoyAdvanced version 1.7.x. The exploit allows an attacker to execute arbitrary code by overflowing a buffer and overwriting the return address. The exploit was found and coded by Qnix. The exploit utilizes a shellcode to gain unauthorized access.

Recent Exploits: