Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 155 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Samba Buffer Overflow Vulnerability

A buffer overflow vulnerability has been reported for Samba. The problem occurs when copying user-supplied data into a static buffer. By passing excessive data to an affected Samba server, it may be possible for an anonymous user to corrupt sensitive locations in memory. Successful exploitation of this issue could allow an attacker to execute arbitrary commands, with the privileges of the Samba process.

BigAnt Server 2.52 SP5 SEH Stack Overflow ROP-based exploit (ASLR + DEP bypass)

This exploit takes advantage of a stack overflow vulnerability in BigAnt Server version 2.52 SP5. It bypasses Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) protections. The attack plan involves overwriting the Structured Exception Handling (SEH) handler with a Return-Oriented Programming (ROP) gadget. The ROP Chain is then executed to perform a VirtualAlloc() and PUSHAD. Finally, the shellcode is run.

WebC Remote Exploit

This exploit targets a boundary condition error in WebC, allowing a remote attacker to gain unauthorized access to a vulnerable host. The exploit code sets up a shellcode that includes commands for privilege escalation, forking a daemon process, and binding a shell to a specific port. The exploit fills in the necessary addresses and port number in the shellcode to execute the attack.

Multiple Persistent Cross-Site Scripting (XSS) in Endpoint Protector

Multiple Persistent Cross-Site vulnerabilities were found in Endpoint Protector v4.0.4.2, because the application fails to sanitize the response before it is returned to the user. This can be exploited to execute arbitrary script and HTML code in a user's browser session. This may allow the attacker to steal the user's cookie and to launch further attacks.

Aladdin Knowledge System Ltd ChooseFilePath Buffer Overflow

This module exploits a vulnerability found in Aladdin Knowledge System's ActiveX component. By supplying a long string of data to the ChooseFilePath() function, a buffer overflow occurs, which may result in remote code execution under the context of the user.

ntdll.dll Bounds Checking Vulnerability

The Windows library ntdll.dll includes a function that does not perform sufficient bounds checking. The vulnerability is present in the function 'RtlDosPathNameToNtPathName_U' and may be exploited through other programs that use the library if an attack vector permits it. One of these programs is the implementation of WebDAV that ships with IIS 5.0. The vector allows for the vulnerability in ntdll.dll to be exploited by a remote attacker. Several other library functions which call the vulnerable ntdll.dll procedure have been identified. Administrators are advised to patch as other attack vectors are likely to surface. Microsoft has revised its advisory to state that this vulnerability affects Windows NT systems. As Windows NT does not support WebDAV, exploits using WebDAV as the attack vector will not be effective against Windows NT systems. Windows XP does not also include WebDAV by default, but other attack vectors may be possible, especially in cases where the attacker has interactive access to the system. WebDAV may be installed by a user on Windows XP with IIS 5.1, so WebDAV may be a possible means of exploitation in these circumstances. Reports suggest that numerous hosts have been scanned in an attempt to exploit this vulnerability. Although unconfirmed, this may be the result of a system of automated attacks. It has been reported that this vulnerability is also present in the 'RtlGetFullPathName_U' function. The supplied Microsoft patch (Q815021) also corrects this function. It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability.

WFTPD server 3.23 (SIZE) 0day remote buffer overflow exploit

This exploit is for WFTPD server version 3.23, targeting the buffer overflow vulnerability in the SIZE command. The exploit allows remote attackers to execute arbitrary code on the target system. The exploit has been coded by h07 and has been tested on XP SP2 Polish and 2000 SP4 Polish. The exploit requires the attacker to provide the IP address of the target server, their username, and password. After successful exploitation, a reverse shell is opened on port 4444. The shellcode used in the exploit is a win32 reverse shellcode from metasploit.com.

Recent Exploits: