header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Opera 8.2 Windows XP Prof. SP2 (Tested) – Denial of Service Vulnerability

This exploit targets Opera 8.2 on Windows XP Professional SP2. By creating a specially crafted HTML file, an attacker can trigger a denial of service condition, causing the application to crash. This can be achieved by providing a large input to the 'bodyA' tag, causing a buffer overflow.

phpscripte24 Live Shopping Multi Portal System SQL Injection Vulnerability Exploit

This exploit targets the phpscripte24 Live Shopping Multi Portal System by injecting SQL commands through the 'seite' parameter in the index.php file. It allows an attacker to execute arbitrary SQL queries on the database, potentially leading to unauthorized access or data manipulation.

OpenBSD 2.x – 3.3 exec_ibcs2_coff_prep_zmagic() kernel stack overflow

The exec_ibcs2_coff_prep_zmagic() function in OpenBSD 2.x through 3.3 allows remote attackers to execute arbitrary code via a crafted iBCS2 header with a length parameter that exceeds the actual header length, which triggers a stack-based buffer overflow.

Buffer Overflow in PhotoFiltre Studio X

This is a local buffer overflow exploit for PhotoFiltre Studio X .tif files. It allows an attacker to overwrite the seh handler with a pop pop ret instruction and overwrite the next seh with a jmp ebp instruction. The exploit then finds the exact location ebp points to and writes a jmp 0x40 bytes instruction. This exploit does not have space for shellcode, so a jmp ebp option is chosen instead of an egghunter. The exploit is designed for MS Windows xp pro sp3.

All browsers 0day Crash Exploit

This is a 0day exploit that crashes all major browsers including Mozilla Firefox, Internet Explorer, Google Chrome, Netscape, and Opera. The exploit utilizes a DoS (Denial of Service) attack by creating a buffer overflow. It injects a script into the browser's body onload event, which continuously adds characters to a buffer until it overflows and crashes the browser.

Recent Exploits: