header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Adrenalin Player (.asx) – SEH Buffer Overflow

The exploit takes advantage of a buffer overflow vulnerability in Adrenalin Player. By sending a specially crafted .asx file, an attacker can overwrite the Structured Exception Handler (SEH) and gain control of the program execution flow. This exploit has been tested on Adrenalin Player version 2.2.5.3 running on Windows XP SP3.

Adrenalin Player (SEH) Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in Adrenalin Player. By sending a specially crafted payload, an attacker can overwrite the Structured Exception Handler (SEH) to execute arbitrary code. The exploit uses a combination of NOP padding, a short jump, and a POP POP RETN sequence to achieve code execution. Additionally, it includes a shellcode payload to create a bind shell on port 4444. The exploit has been tested on Windows XP SP3.

SIEMENS Solid Edge ST4/ST5 SEListCtrlX ActiveX Control SetItemReadOnly Arbitrary Memory Rewrite Remote Code Execution Vulnerability

By setting to a memory address the first argument and the second one to 'false' you can write a NULL byte inside an arbitrary memory region. By setting to a memory address the first argument and the second one to 'true' you can write a x08 byte inside an arbitrary memory region.

Xfire Remote DoS Exploit

This exploit allows an attacker to send a malicious packet to the Xfire client on UDP port 25777, causing it to terminate. It has been tested on Windows XP Service Pack 1 and 2. The successful exploitation of this vulnerability results in the client displaying an error message and crashing.

Remotely Exploitable Buffer Overflow in MSN Messenger and Windows Messenger

A remotely exploitable buffer overflow exists in MSN Messenger and Windows Messenger. This vulnerability is related to parsing of Portable Network Graphics (PNG) image header data. Successful exploitation will result in execution of arbitrary code in the context of the vulnerable client user.

Recent Exploits: