header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Hard to exploit vulnerability

The exploit code provided in the text is a proof of concept for a memory corruption vulnerability. The code attempts to write a pointer to a specific memory location, but due to the limitations of the controlled length, it chooses a different memory address. The code has been tested on multiple systems, with a success rate of only 5 out of 10+. The author mentions that this vulnerability can be avoided, but triggers a segfault instead.

Crafted Metafile (WMF) Denial of Service Vulnerability

The crafted metafile (WMF) crashes Windows Explorer when viewed. The issue occurs when the 'mtNoObjects' field in the Metafile header is set to 0x0000. This code was tested on Windows 2000 server SP4 and does not occur with the hotfix for GDI (MS05-053) installed.

MSDTC remote PoC exploit

This is a proof of concept exploit for the MSDTC (Microsoft Distributed Transaction Coordinator) vulnerability. It allows remote attackers to execute arbitrary code on a vulnerable Windows system.

Mambo <= 4.5.2 Globals overwrite / remote commands execution

This exploit allows an attacker to overwrite global variables in Mambo version 4.5.2, leading to remote command execution. The exploit was coded by rgod and can be launched from Apache. The attacker needs to fill in the requested fields before executing the exploit.

Stack Overflow in eZnet.exe – Remote Exploit

Will download a trojan from any address which you provide on the target system, then will execute the trojan. For this exploit I have tried several strategies to increase reliability and performance: + Jump to a static 'call esp' + Backwards jump to code a known distance from the stack pointer since the stack address seems to change for each version of eznet. + Works out the byte difference for custom urls (must be no longer than 254 bytes!!) + Causes eznet.exe to restart (not really my choice ;o) + Shellcode steals addresses from a static module.

OSH 1.7-14 Exploit

The Operator Shell (Osh) is a setuid root, security enhanced, restricted shell. It allows the administrator to carefully limit the access of special commands and files to the users whose duties require their use, while at the same time automatically maintaining audit records. The configuration file for Osh contains an administrator defined access profile for each authorized user or group. The exploit takes advantage of a bug in the code that handles substitutions of environmental variables. By appending to the return value of the getenv() function, an attacker can overwrite one of the environmental variables passed to the child process.

Recent Exploits: