header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Firefox location.QueryInterface() Code Execution (Linux x86)

This module exploits a code execution vulnerability in the Mozilla Firefox browser. To reliably exploit this vulnerability, we need to fill almost a gigabyte of memory with our nop sled and payload. This module has been tested on Gentoo Linux with the stock Firefox 1.5.0 package.

MS Excel Malformed FEATHEADER Record Exploit

This exploit targets a vulnerability in MS Excel which allows an attacker to execute arbitrary code by exploiting a malformed FEATHEADER record. The vulnerability has been assigned CVE-2009-3129 and is covered by the Microsoft security bulletin MS09-067. The affected versions of MS Office are 2003 and 2007. The exploit has been tested on Windows XP SP2 with MS Office 2003 v. 11.5604.5606. The original discovery of this exploit was made by Sean Larsson.

Microsoft HTML Help Workshop .hhp file Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in Microsoft HTML Help Workshop. By creating a specially crafted .hhp file, an attacker can trigger a buffer overflow and execute arbitrary code on the target system. The exploit code includes a bindshell payload that opens a listening port (13579) on the target machine. This exploit is based on code from realplayer .smil exploit.

Microsoft Windows win32k!xxxRealDrawMenuItem() missing HBITMAP bounds checks

The win32k.sys module in Microsoft Windows 7 does not perform proper bounds checks on HBITMAP handles, which allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, aka a 'Windows Kernel Elevation of Privilege Vulnerability'.

Recent Exploits: