header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Perl Buffer Overflow Exploit

This script demonstrates a buffer overflow vulnerability in Perl. The script takes a target IP as input and creates a buffer with a length of 4100 bytes. It also creates a longer buffer with a length of 1999999 bytes. The script then attempts to exploit the buffer overflow by overwriting the return address with a specific value. The shellcode is also included in the script to execute arbitrary code.

Vulnerability in modem Arescom NetDSL-1000

If you flood the telnet configuration a couple dozen times with long strings, eventually the telnetd service flat out dies. Routing functions of the NetDSL continue to work fine as before. It is unknown whether only the telnetd service is affected, other means of remote configuration may have become unavailable as well.

Microsoft Windows CreateWindow function callback vulnerability

A crash due to an invalid read in the Windows kernel can be reliably leveraged into privileged code execution resulting in a privilege escalation local vulnerability. This happens because special values of 'hParent' where not sufficiently taken into account when patching 'xxxCreateWindowsEx' on MS010-032.

MS10-054 Proof Of Concept by Laurent Gaffie

This is a proof of concept for MS10-054 vulnerability. It is a remote code execution vulnerability in Microsoft Windows SMB Client. An attacker could exploit this vulnerability by convincing a user to connect to a malicious SMB server or by tricking a user into clicking on a specially crafted link. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code with the privileges of the user.

PHPKick v0.8 statistics.php SQL Injection

This exploit allows an attacker to perform SQL injection on the statistics.php file in PHPKick v0.8. It works regardless of the PHP security settings, including magic_quotes and register_globals. This exploit is for educational purposes only and should not be used without permission. The exploit was found by garwga (ICQ#:453-144-667).

Recent Exploits: