header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote exploit for the php memory_limit vulnerability

The exploit constructs a fake zend hash table and sends it in the first request. The second request triggers a memory interruption and uses the memory allocated for the hashtable, which contains the data from the previous request, including the pDestructor pointer pointing to the nop+shellcode. This happens in the zend_hash_destroy function.

MailEnable IMAP Service Remote Buffer Overflow Exploit

This exploit targets the MailEnable IMAP Service and allows for remote buffer overflow. It affects MailEnable versions Pro v1.52 and Enterprise v1.01. The exploit code was discovered by Nima Majidi at www.hat-squad.com and was developed by class101 at www.hat-squad.com and dfind.kd-team.com. The vulnerability has been fixed and the patch can be found at http://mailenable.com/hotfix/MEIMAPS-HF041125.zip.

Prozilla-1.3.6 Format String/Buffer Overflow Vulnerability

This is a stack overflow exploit for the unpublished prozilla-1.3.6 format string/buffer overflow vulnerability. It allows an attacker to execute arbitrary code by sending a specially crafted HTTP request. The exploit has been tested successfully against current versions of Gentoo, Slackware, Debian, and SUSE. The client side can be exploited by sending a request to proz hostname:port/anyfile.name, with the default listen port being 8080. The shellcode used in the exploit is a custom shellcode with no control characters. The NOPs in the shellcode will be patched for an attacker-defined IP and port at runtime.

CoffeeCup FTP Clients Buffer Overflow Vulnerability Exploit

This exploit creates a fake FTP server on your machine, waiting for the connection of an FTP client. After the exploit is sent a shell (command prompt) is spawned on port 5555 of the target machine. This exploit works locally or remotely.

Recent Exploits: