header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

FREE SMTP Spam Filter Exploit

This exploit is a buffer overflow vulnerability in the FREE SMTP Spam Filter software. It allows an attacker to send malicious code to the server, which can be used to execute arbitrary code on the server. The exploit is triggered by sending a specially crafted email with a malicious payload to the server. The malicious payload contains a JavaScript code that will be executed when the user hovers over a link in the email.

P2P Pro Command DOS Exploit

This exploit is used to cause a denial of service (DoS) attack on the P2P Pro software. It sends a malicious packet to the target system which causes the system to crash. The malicious packet contains a string of characters which are not recognized by the system and causes it to crash.

Dameware Mini Remote Control Client Agent Service Pre-Authentication Buffer Overflow

A buffer overflow vulnerability can be exploited remotely by an unauthenticated attacker who can access the DameWare Mini Remote Control Server. By default (DameWare Remote Control Server) DWRCS listens on poort 6129/TCP. The vulnerability is caused due to a boundary error within the handling of the 'DAMEWARE-BROWSER-REQUEST' packet. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted packet to the affected service. Successful exploitation may allow execution of arbitrary code with SYSTEM privileges.

Gopher[v3.0.9+]: Remote (Client) Buffer Overflow Exploit

The Internet Gopher Client is based on the UMN Gopher/Gopherd 2.3.1 code. Gopher is an Internet technology that predates the Web. It presents information as a virtual network-wide filesystem. Modern browsers such as Konqueror can display gopherspace as if it contained files on your local machine (trees, drag and drop, etc.), but the difference is that each file or folder in that tree may be on a different machine. This client contains a remotely exploitable buffer overflow in the processing of “+VIEWS:” information, located in SRC/object/VIews.c in the VIfromLine() function. This is a stack overflow that can be exploited immediately upon the client's connection to an untrusted gopher server.

Adobe Version Cue VCNative[OSX]: local root exploit. (dyld)

Adobe Version Cue's VCNative program allows un-privileged local users to load arbitrary libraries('bundles') while running setuid root. This is done via the '-lib' command-line option. An attacker can exploit this vulnerability by listening to an arbitrary local port and using the localhost('127.0.0.1') to connect to.

Recent Exploits: