header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Unsanitized Input in addlist.php

The addlist.php file in the newsletter/admin directory of the server application does not properly sanitize the user-supplied input. This allows an attacker to inject malicious code, such as a script tag, which can be executed by other users visiting the page. In this specific case, the vulnerability allows an attacker to execute arbitrary JavaScript code and potentially steal cookies or perform other malicious actions on behalf of the user.

IDEAL Administration 2009 v9.7 Local Buffer Overflow Exploit

This exploit takes advantage of a local buffer overflow vulnerability in IDEAL Administration 2009 v9.7. It allows an attacker to execute arbitrary code on the target system. The exploit payload is a shell_bind_tcp payload with an encoder: x86/alpha_mixed. It uses the SEH (Structured Exception Handling) technique and binds a shell to port 4444 on the target system.

RPCDCOM2.c ver1.1

This exploit allows for remote code execution through a buffer overflow vulnerability in RPCDCOM2.c version 1.1. The vulnerability is triggered by sending a specially crafted bind request to the target system. The exploit payload is included in the bindstr array. By exploiting this vulnerability, an attacker can execute arbitrary code on the target system.

Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) Overlong DSC Comment Buffer Overflow Exploit

An overlong string as DSC comment (more than 42000 bytes) results in a direct EIP overwrite. Exception is first-chance so the program will never crash. At the moment of the redirection EAX and ESI are user-controlled. This portion of the buffer begins with '%' (it is the next DSC comment) but as you can see the resulting pattern is nop-equivalent.

e-Post SPA-PRO Mail @Solomon SPA-IMAP4S 4.01 Service Buffer Overflow Vulnerability

This POC code binds shell on port 2001 of a vulnerable e-Post SPA-PRO Mail @Solomon IMAP server. It assumes default mailbox configuration C:mailinbox%USERNAME%. Any changes to the mailbox configuration will cause this POC to fail due to the length differences.

Recent Exploits: