header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

minerCPP 0.4b Remote BOF+Format String Attack Exploit

This exploit takes advantage of a format string attack vulnerability in the minerCPP 0.4b software. It allows an attacker to calculate the master cookie and get the ESP of the current thread. However, due to the BOF being in another thread, the ESP obtained may not match the required ESP, making the exploit unstable. Code execution worked 10 out of 50 times.

UFO: Alien Invasion v2.2.1 BoF Exploit (Win7 ASLR and DEP Bypass)

This exploit allows for a buffer overflow in the UFO: Alien Invasion game version 2.2.1 on Windows 7. By redirecting the victim's DNS to a specific IP and having them click on the multiplayer lobby, an attacker can execute arbitrary code. The exploit has been tested on Windows 7 Ultimate x64 ENG. There is a possibility that this exploit can work on a different Windows version by changing the last bytes of the exploit code.

Sun Java Web Server Exploit

This exploit targets Sun Java Web Server version 7.0 update 7. It is a remote code execution vulnerability that allows an attacker to execute arbitrary code on the target system. The exploit uses a combination of payload encoding, stack buffer overflow, and shellcode execution to achieve code execution. The exploit was identified by Evgeny Legerov and developed by Dominic Chell. The exploit requires the target IP address, port, and directory as input parameters. It is recommended to apply the necessary patches and updates to mitigate this vulnerability.

HP OpenView NNM getnnmdata.exe CGI Invalid Hostname Remote Code Execution

The exploit allows an attacker to execute arbitrary code on a vulnerable system by sending a specially crafted request to the getnnmdata.exe CGI script. This vulnerability is due to an invalid hostname check in the script, which can be bypassed to execute arbitrary code. The vulnerability has been assigned CVE-2010-1555.

HP OpenView NNM getnnmdata.exe CGI Invalid ICount Remote Code Execution

This exploit allows remote attackers to execute arbitrary code via a crafted ICount parameter in a CGI request to getnnmdata.exe. The vulnerability exists in HP OpenView Network Node Manager (NNM) and allows an attacker to execute arbitrary code with the same privileges as the NNM server.

Recent Exploits: