header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TFTPUtil GUI v1.4.5 Invalid Request DoS

The TFTPUtil GUI server version 1.4.5 can be DOSed by sending a specially crafted read request. Depending of the setup, sending write request "x00x02" may also work. Discovered by musashi42.

SQL Injection in Etomite

The vulnerability exists due to failure in the "/index.php" script to properly sanitize user-supplied input in search variable. Attacker can alter queries to the application SQL database, execute arbitrary queries to the database, compromise the application, access or modify sensitive data, or exploit various vulnerabilities in the underlying SQL database.

revilloC mail server PoC exploit ( for xp sp1)

This is a proof of concept exploit for the revilloC mail server that targets XP SP1. It takes advantage of a buffer overflow vulnerability in the USER command to cause an access violation. The exploit code is written in Perl and uses a shellcode to execute arbitrary code on the target system.

j-integra v2.11 Remote code execution vulnerability

This vulnerability allows for remote code execution in j-integra v2.11. The object classid 'clsid:F21507A7-530F-4A89-8FE4-9D989670FD2C' is not marked safe for scripting, allowing an attacker to execute arbitrary code. The exploit has been tested on XP SP3 IE7. The impact is considered low due to the object not being marked safe for scripting. The vulnerability was silently patched by the developers in version v2.12.

OTSTurntables 1.00.028 (m3u/ofl) Local BOF Exploit (SEH)

This exploit is a buffer overflow vulnerability in OTSTurntables version 1.00.028. The vulnerability can be exploited locally by using a specially crafted m3u or ofl file. By exploiting this vulnerability, an attacker can gain control of the affected system and execute arbitrary code.

CA Internet Security Suite 2010 KmxSbx.sys Kernel Pool Overflow 0-day Exploit

The KmxSbx.sys kernel driver in CA Internet Security Suite 2010 is vulnerable to a pool corruption vulnerability in the handling of IOCTL 0x88000080. This allows an attacker with local access to execute arbitrary code within the kernel.

Xion Audio Player 1.0.127 (m3u) Buffer Overflow Vulnerability

The Xion Audio Player version 1.0.127 is vulnerable to a buffer overflow vulnerability when parsing m3u files. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system. The exploit code provided in the script triggers the buffer overflow and executes a bind shell payload on port 4444.

Recent Exploits: