header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Local Lame R00T sploit for exim <= 4.42

This is a local exploit script written in bash that targets exim versions <= 4.42. It includes a C code snippet that is used to get the address of a given environment variable. The script then compiles the C code and copies it to /usr/bin. It then changes directory to /usr/exim/bin and executes the exim binary with a crafted argument that triggers the exploit.

Free Download Manager <= 3.0 Build 844 .torrent BOF Exploit

This is a buffer overflow exploit for Free Download Manager version 3.0 Build 844. The exploit utilizes a SEH overflow and a shellcode builder/assembler technique called 'shell building'. It demonstrates how power can be obtained with limitations to the buffer.

Proof of Concept exploit for 3CServer v1.1 FTP server

This is a proof of concept exploit for the 3CServer v1.1 FTP server. It uses a buffer overflow vulnerability to overwrite the SEH pointer. The exploit code is written in C and includes a shellcode that opens a reverse shell on port 1180. The exploit works by sending a specially crafted FTP command to the server.

[OSX Finder] DS_Store arbitrary file overwrite exploit. (root version)

This exploit allows an attacker to create a directory called "xfinder" in the user's home directory. Once the root user modifies the directory using Finder, the exploit will write to the .DS_Store file in that directory. The data written to the .DS_Store file will consist of the filenames/subdirectories and attributes of the directory. The exploit works by linking the .DS_Store file to /etc/crontab and creating a special unicode(utf8 encoded) file in the directory. The file created in unicode contains a line that will overwrite /etc/sudoers with "ALL ALL=(ALL) ALL" when written to /etc/crontab. This allows the attacker to escalate privileges and sudo to root.

Amaya Web Editor 11 Remote SEH Overwrite Exploit

This exploit targets Amaya Web Editor version 11 and allows remote attackers to overwrite the Structured Exception Handler (SEH) chain, leading to arbitrary code execution. It takes advantage of a vulnerability in the handling of the 'dir' parameter in the HTML code.

Recent Exploits: