header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OpenBSD 2.x – 3.3 exec_ibcs2_coff_prep_zmagic() kernel stack overflow

The exec_ibcs2_coff_prep_zmagic() function in OpenBSD 2.x through 3.3 allows remote attackers to execute arbitrary code via a crafted iBCS2 header with a length parameter that exceeds the actual header length, which triggers a stack-based buffer overflow.

Buffer Overflow in PhotoFiltre Studio X

This is a local buffer overflow exploit for PhotoFiltre Studio X .tif files. It allows an attacker to overwrite the seh handler with a pop pop ret instruction and overwrite the next seh with a jmp ebp instruction. The exploit then finds the exact location ebp points to and writes a jmp 0x40 bytes instruction. This exploit does not have space for shellcode, so a jmp ebp option is chosen instead of an egghunter. The exploit is designed for MS Windows xp pro sp3.

All browsers 0day Crash Exploit

This is a 0day exploit that crashes all major browsers including Mozilla Firefox, Internet Explorer, Google Chrome, Netscape, and Opera. The exploit utilizes a DoS (Denial of Service) attack by creating a buffer overflow. It injects a script into the browser's body onload event, which continuously adds characters to a buffer until it overflows and crashes the browser.

r57phpbb_admin2exec.pl

This exploit allows an attacker to execute commands on a phpBB forum through the admin_styles.php file. It has been tested on phpBB version 2.0.13. The exploit works by creating a new style and running SQL queries in the database. The attacker can then execute commands through the created file. The exploit also has the ability to retrieve the database prefix.

Multiple Vulnerability in ASPCode CMS

Multiple vulnerabilities have been found in ASPCode CMS. These include multiple XSS vulnerabilities, persistent XSS vulnerability, CSRF vulnerability, and a possible SQL injection vulnerability. The XSS vulnerabilities can be exploited through various URLs, including default.asp?sec=1&ma1= and default.asp?sec=1&tag=. The persistent XSS vulnerability can be exploited by posting in the guestbook section. The CSRF vulnerability allows an attacker to delete a user account or create a super admin account. The possible SQL injection vulnerability can be exploited through the URL default.asp?sec=64&ma1=tag&tag=CMS'.

Recent Exploits: