header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

-UltraISO .mds .mdf files buffer overflow exploit(new 0day)-Author fl0 fl0w

The exploit is a stack buffer overflow in UltraISO software. It affects versions 9.3.6.2750 and can be exploited remotely as well as locally. The bug allows an attacker to overwrite the stack buffer, potentially leading to arbitrary code execution. The exploit is specific to Windows operating systems including Windows 7/2008/Vista/2003/XP (32-bit and 64-bit), Windows 2000, ME, 98SE, 98, or Windows NT4.0 SP6a. There is no known fix for this vulnerability. The exploit code is written in C and requires the gcc compiler version 3.4.4 (cygming special, gdc 0.12, using dmd 0.125). It is recommended to use the cygwin console to avoid any problems under Windows.

Winamp v5.572 Local BoF Exploit (Win7 ASLR and DEP Bypass)

This exploit targets a buffer overflow vulnerability in Winamp version 5.572 on Windows 7 Ultimate x64 ENG. It bypasses ASLR and DEP protections. The exploit involves replacing the 'whatsnew.txt' file in the Winamp folder and then right-clicking on the flash symbol and selecting 'Nullsoft Winamp...' and then 'Version history'. The exploit uses a ROP chain to control program execution.

PHP Windows XP SP1 EIP Overwrite Exploit

This exploit is designed to work with PHP versions 4.3.10 and 4.4.0 under Windows XP SP 1. It overwrites the EIP (Extended Instruction Pointer) with a CALL ESI from ws2_32.dll from Windows XP SP1. The shellcode is written into the $user variable and a temporary memory location is trashed. This exploit is specifically for Apache/1.3.33 and PHP/4.4.0 on Windows only.

WinRAR 3.3.0 and below local BOF exploit

This is a local buffer overflow exploit for WinRAR version 3.3.0 and below. The exploit uses a jmp esp instruction in various DLLs to gain control of the program flow. The exploit also includes Metasploit shellcode to establish a reverse shell on port 4444.

Plotwn 18 (.wp2) local Buffer Overflow Poc

This exploit is a proof of concept for a local buffer overflow vulnerability in Plotwn 18 (.wp2) file format. It has been tested on Windows XP SP3 FR. The exploit is triggered by opening a specially crafted .wp2 file. The vulnerability allows an attacker to overwrite the EIP register, leading to arbitrary code execution.

Remote Arbitrary Code Execution Vulnerability in UFO: Alien Invasion

This paper discusses how an unprivileged remote attacker can execute arbitrary code on networked players' computers. The IRC client component of UFO: Alien Invasion 2.2.1 contains multiple security vulnerabilities that allow a malicious IRC server to remotely execute arbitrary code on the client's computer.

Recent Exploits: