header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

SlimFTPd <= 3.15, Remote Buffer Overflow Exploit v0.1

This exploit allows an attacker to execute arbitrary code on a vulnerable SlimFTPd server. By sending a large buffer to certain commands such as CWD, STOR, MKD, STAT, the attacker can trigger a buffer overflow, potentially leading to remote code execution. The attacker needs to be logged in to the server. The vendor has been notified and is working on a fix.

IntelliTamper 2.07 Location: HTTP Header Remote Code Execution exploit

This exploit allows an attacker to execute arbitrary code remotely by exploiting a vulnerability in IntelliTamper 2.07. The exploit is based on the work of Koshi, written in Perl, but this version is more stable. The purpose of this exploit is for educational and learning purposes about win32 exploitation.

CCProxy 6.2 ping Remote Buffer Overflow Exploit

Based on Ruder's discovery, this exploit allows an attacker to execute arbitrary code by sending a long parameter to the ping command in the telnet service of CCProxy server. The vulnerability is a stack-based overflow. The exploit uses a shellcode that binds to port 101 and connects back to the attacker using netcat. This exploit has been tested on Windows XP SP1 English.

qwik-smtp Remote Root Exploit

This exploit takes advantage of a format string bug in qwik-smtpd. The exploit overwrites the LSW and MSW of the exit() GOT entry in two stages. It then sends an EXIT command to force the qwik-smtpd to jump into the shellcode. The exploit also circumvents the filtering of spaces chars by using another char (0x10) and decrementing it before calling the int 0x80 syscall.

Cisco IOS Remote DoS Exploit

This script is a remote DoS exploit against a vulnerability in Cisco IOS. It works by using hping to send a large number of packets to the target device, causing it to become unresponsive. The script requires tcsh and hping to be installed. It also requires root privileges or the script to be setuid root due to hping's use of raw sockets. The example provided demonstrates how the script can be used to target a specific IP address and TTL value.

Recent Exploits: