header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GNU Mailutils 0.6 imap4d ‘search’ format string exploit

This exploit takes advantage of a format string vulnerability in GNU Mailutils 0.6 imap4d. By sending a specially crafted 'search' command, an attacker can execute arbitrary code on the target system. This exploit uses hardcoded values from GNU/Debian testing (etch).

Java Mini Web Server <= 1.0 Path Draversal & Cross Site Scripting

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. A Path Traversal attack aims to access files and directories that are stored outside the web root folder.

Zip Unzip v6 (.zip) 0day stack buffer overflow PoC exploit

This is a proof of concept exploit for a stack buffer overflow vulnerability in Zip Unzip v6 (.zip) software. The exploit allows an attacker to execute arbitrary code on a vulnerable system. The exploit code is provided 'as is' and should only be used for educational purposes. Any unauthorized use of this code is illegal and the author cannot be held responsible for any damages caused.

TugZip 3.5 (.zip) Exploit

This exploit targets TugZip 3.5, a software vulnerability in handling .zip files. The exploit uses a specific sequence of bytes to exploit the vulnerability and gain control over the Structured Exception Handler (SEH). The exploit is designed for educational purposes only and should not be used for any illegal activities.

Free MP3 CD Ripper 2.6 (wav) 1day stack buffer overflow PoC exploit

This is a proof-of-concept exploit for a stack buffer overflow vulnerability in Free MP3 CD Ripper version 2.6 (wav). The vulnerability allows an attacker to execute arbitrary code by overflowing a buffer on the stack. The exploit is based on the discovery by Richard Leahy and was provided by mr_me. The exploit can be downloaded from the provided link. The platform for this exploit is Windows XP sp3.

Recent Exploits: