header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

wvtftp option name heap overflow remote root exploit

Exploitation is not exactly straight forward. When we overflow our buffer, we overwrite a pointer that is freed before we get to trigger our overwrite. So we have to restore the state of this pointer to some sane value so it can be freed. After we do this, we trigger the overwrite and hijack the jumpslot for malloc(). Then to trigger malloc(), we send a bogus request and then connect to our shell. All of the offsets should be fixed for 32 bit platforms, all you need to pass is the base address of the heap buffer we're overflowing.

WinRemotePC Full+Lite 2008 r.2server DOS(memory+cpu consumption) vulnerability poc

A vulnerability exists in WinRemotePC Full+Lite 2008 r.2+server in the way it handles received packets because it fails to properly process/sanitize arbitrarily lengths and/or invalid packets. The vulnerability occurs both before and after login. When confronted with such packets, the server starts consuming full CPU and memory and sometimes leads to immediate crash. Although I couldn't find a packet pattern for immediate crash or exploitation, the DOS is certain through CPU+memory consumption. If one of the memory or CPU events did not occur, rerunning the POC might fix that.

Facebook Newsroom Application Remote File Inclusion Vulnerability

The Facebook Newsroom Application is vulnerable to Remote File Inclusion. An attacker can exploit this vulnerability by injecting a malicious file through the 'path' parameter in the 'home.php' file. This allows the attacker to execute arbitrary code and potentially gain unauthorized access to the system.

Winsock Error Codes

This code snippet shows a list of error codes related to Winsock (Windows Sockets) in a C program. These error codes are used to handle different types of errors that can occur during socket operations. The code snippet also includes a function called std_err() that handles these errors and prints the corresponding error message. This information can be useful for understanding and debugging network programming in Windows.

DAP 8.x (.m3u) File BOF C Exploit for XP SP2,SP3 English

This exploit targets a buffer-overflow vulnerability in Download Accelerator Plus (DAP) version 8.x. The vulnerability allows remote attackers to execute arbitrary code in the context of the application. By creating a specially crafted .m3u file, an attacker can trigger a buffer overflow and exploit the vulnerability. The exploit code is written in C and was developed by Shinnok (raydenxy [at] yahoo dot com). The original proof-of-concept was discovered by Krystian Kloskowski (h07) <h07@interia.pl>.

OllyDBG v1.10 and ImpREC v1.7f export name buffer overflow vulnerability

This exploit targets OllyDBG v1.10 and ImpREC v1.7f. It is a buffer overflow vulnerability that can be triggered by loading a DLL into a process and attempting to attach OllyDBG or ImpREC to it. The included shellcode demonstrates a messagebox and is configured for OllyDBG. The bug was discovered and the PoC was coded by Defsanguje on July 7, 2008.

Recent Exploits: