header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Desktop Protocol (RDP) Remote Code Execution Vulnerability

This exploit takes advantage of a vulnerability in the Remote Desktop Protocol (RDP) service, allowing an attacker to execute arbitrary code on a vulnerable system. The exploit uses a specially crafted payload to trigger the vulnerability and gain control of the target system.

Ktools Photostore <= v3.5.2 (crumbs.php) Remote SQL Injection

The Ktools Photostore version 3.5.2 is vulnerable to a remote SQL injection attack in the crumbs.php file. This exploit only works when magic quotes are turned off. The vulnerability allows an attacker to inject malicious SQL queries through the 'gid' parameter in the URL, leading to unauthorized access to the database. The exploit was discovered by DNX.

WinRar local buffer overflow exploit V1.0

This exploit allows an attacker to execute arbitrary code on a target system by exploiting a buffer overflow vulnerability in WinRar. The exploit takes advantage of a crafted RAR header and launches a local cmd.exe shell. The targets for this exploit are WinXP SP1 user32.dll [0x77D718FC] and WinXP SP2 user32.dll [0x77D8AF0A]. The exploit also requires the presence of WinRar 2.x series. The system() function from msvcrt.dll is used to execute the shellcode.

TFTPServer SP v1.4 for Windows remote .bss overflow exploit

TFTPServer SP v1.4 is vulnerable to a very long TFTP Error Packet which can lead to a buffer overflow. This exploit will overwrite the .bss section and some portion of the .idata section to patch function addresses in the IAT. The exploit can be used to either target the TFTPServer Service or the RunStandAlone version. For the TFTPServer Service, the time() function will be patched, while for the TFTPServer StandAlone program, the printf() function will be patched.

JpegOfDeath.M.c v0.6.a All in one Bind/Reverse/Admin/FileDownload

This exploit allows an attacker to perform various actions such as adding a user to the admin group, downloading a file from an HTTP server, sending a reverse shell to a specified IP on a specific port, and binding a shell on the exploited machine. The exploit is provided as is and the author disclaims any liability for its use.

Recent Exploits: