header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

DMS POP3 Server Overflow

This script exploits a buffer overflow vulnerability in the DMS POP3 Server for Windows 2000/XP version 1.5.3 build 37. By sending a long string of 'A' characters as the username, it crashes the server and potentially allows for remote code execution. The exploit attempts to kill the DMS POP3 service by sending the malicious username and then checks if the service is still running. This vulnerability was discovered in 2004.

Circumvent Windows XP SP2 security features using execCommand ‘SaveAs’ function!

This exploit allows an attacker to bypass the security features of Windows XP SP2 by using the execCommand 'SaveAs' function. By tricking a user into downloading a malicious executable file masquerading as an HTML document, the attacker can bypass the 'File Download - Security Warning' and 'Open File - Security Warning' prompts.

Microsoft Windows Vulnerability in Compressed (zipped) Folders (MS04-034)

This exploit targets a vulnerability in Compressed (zipped) Folders in Microsoft Windows. It allows an attacker to execute arbitrary code by creating a malicious zip file and tricking the user into opening it. The vulnerability was discovered by Tarako and was first reported in an advisory by eEye Digital Security. This exploit was tested on Windows XP SP0 Spanish/English.

Numark Cue 5.0 rev 2 Local .M3U File Stack Buffer Overflow

This exploit launches calc.exe by taking advantage of a buffer overflow vulnerability in Numark Cue 5.0 rev 2. The buffer overflow occurs when processing a .M3U file, with a 500-byte buffer causing the exception. The exploit has been tested on Windows XP Pro SP3, compiled with Dev-C++ 4.9.9.2.

Recent Exploits: