header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Viscom Software Movie Player Pro SDK ActiveX 6.8 Remote Buffer Overflow

A stack-based buffer overflow occurs when you pass to "strFontName" parameter a string overly long than 24 bytes which leads into EIP overwrite allowing the execution of arbitrary code in the context of the logged on user. This happens because an inadequate space is stored into the buffer intended to receive the font name.

HP Operations Manager <= v8.16 - (srcvw4.dll) LoadFile()/SaveFile() Remote Unicode Stack Overflow PoC

This is a proof-of-concept exploit for a remote unicode stack overflow vulnerability in HP Operations Manager version 8.16. The vulnerability exists in the LoadFile() and SaveFile() functions of the srcvw4.dll module. The exploit allows an attacker to overwrite the address of the seh handler and potentially execute arbitrary code.

Openreglement 1.04 (RFI/LFI) Multiple File Include Vulnerability

Openreglement 1.04 has a vulnerability that allows remote file inclusion (RFI) and local file inclusion (LFI). This vulnerability can be exploited by an attacker to include arbitrary files from the server, leading to potential information disclosure or remote code execution.

Windows 7/2008R2 SMB Client Trans2 stack overflow (MS10-020)

This exploit takes advantage of a stack overflow vulnerability in the SMB client of Windows 7/2008R2. By sending a specially crafted packet, an attacker can overwrite the EBP and EIP registers, allowing for arbitrary code execution. The vulnerability is tracked as CVE-2010-0270.

MailGust 1.9 SQL Injection / board takeover

This is a proof-of-concept exploit for MailGust 1.9 (and possibly prior versions) that allows for SQL injection and board takeover. The exploit also has generic HTTP proxy support. It is created by rgod and can be found on his website http://rgod.altervista.org. To run this script, make sure to make certain changes in the php.ini file. The usage of this exploit involves launching the script from Apache, filling in the requested fields, and sending yourself a new admin password.

Magneto Net Resource ActiveX v4.0.0.5 NetShareEnum Exploit (Universal)

This exploit targets a vulnerability in the Magneto Net Resource ActiveX control, specifically in the NetShareEnum function. By exploiting this vulnerability, an attacker can execute arbitrary code on the victim's system. The exploit uses a shellcode payload to launch the Windows calculator application (calc.exe).

Recent Exploits: