header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Aladdin Knowledge System Ltd ChooseFilePath Buffer Overflow

This module exploits a vulnerability found in Aladdin Knowledge System's ActiveX component. By supplying a long string of data to the ChooseFilePath() function, a buffer overflow occurs, which may result in remote code execution under the context of the user.

ntdll.dll Bounds Checking Vulnerability

The Windows library ntdll.dll includes a function that does not perform sufficient bounds checking. The vulnerability is present in the function 'RtlDosPathNameToNtPathName_U' and may be exploited through other programs that use the library if an attack vector permits it. One of these programs is the implementation of WebDAV that ships with IIS 5.0. The vector allows for the vulnerability in ntdll.dll to be exploited by a remote attacker. Several other library functions which call the vulnerable ntdll.dll procedure have been identified. Administrators are advised to patch as other attack vectors are likely to surface. Microsoft has revised its advisory to state that this vulnerability affects Windows NT systems. As Windows NT does not support WebDAV, exploits using WebDAV as the attack vector will not be effective against Windows NT systems. Windows XP does not also include WebDAV by default, but other attack vectors may be possible, especially in cases where the attacker has interactive access to the system. WebDAV may be installed by a user on Windows XP with IIS 5.1, so WebDAV may be a possible means of exploitation in these circumstances. Reports suggest that numerous hosts have been scanned in an attempt to exploit this vulnerability. Although unconfirmed, this may be the result of a system of automated attacks. It has been reported that this vulnerability is also present in the 'RtlGetFullPathName_U' function. The supplied Microsoft patch (Q815021) also corrects this function. It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability.

WFTPD server 3.23 (SIZE) 0day remote buffer overflow exploit

This exploit is for WFTPD server version 3.23, targeting the buffer overflow vulnerability in the SIZE command. The exploit allows remote attackers to execute arbitrary code on the target system. The exploit has been coded by h07 and has been tested on XP SP2 Polish and 2000 SP4 Polish. The exploit requires the attacker to provide the IP address of the target server, their username, and password. After successful exploitation, a reverse shell is opened on port 4444. The shellcode used in the exploit is a win32 reverse shellcode from metasploit.com.

Buffer Overrun Vulnerability in helpctr.exe

The vulnerability exists due to insufficient bounds checking on input supplied via the HCP URI parameter. An attacker can exploit this vulnerability by making a HCP request with an overly long string. This will trigger the overflow condition and may result in malicious attacker-supplied code being executed on the vulnerable system.

AbsoluteTelnet Buffer Overflow Vulnerability

A buffer overflow vulnerability exists in AbsoluteTelnet due to insufficient bounds checking when setting the title bar of the client. An attacker can exploit this vulnerability by enticing a victim user to view a website with malicious HTML tags, leading to a buffer overflow condition and potential code execution.

Directory Traversal Vulnerability in Unreal Engine Games

A directory traversal vulnerability has been discovered in several games that use certain versions of the Unreal Engine. Attackers can exploit this vulnerability to navigate outside of the game's installation directory by utilizing directory traversal sequences. By referencing specific files, it is also possible to cause the game client to crash.

Recent Exploits: