header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Tomabo MP4 Player 3.11.6 SEH Based Stack Overflow

This exploit targets a stack overflow vulnerability in Tomabo MP4 Player version 3.11.6 or below. By opening a specially crafted m3u file, an attacker can execute arbitrary code on the target system. The exploit payload is a bind TCP meterpreter shell on port 4444.

Konica Minolta FTP Utility 1.00 Post Auth CWD Command SEH Overflow

This module exploits an SEH overflow in Konica Minolta FTP Server 1.00. Konica Minolta FTP fails to check input size when parsing 'CWD' commands, which leads to an SEH overflow. Konica FTP allows anonymous access by default; valid credentials are typically unnecessary to exploit this vulnerability.

wordpress plugins wp-Table <= 1.43 (inc_dir) Remote File Inclusion Vulnerability

Input passed to the 'wpPATH' parameter in js/wptable-button.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local or external resources. Successful exploitation requires that 'register_globals' is enabled.

Fenice OMS server remote root exploit

This exploit takes advantage of a buffer overflow vulnerability in the Fenice OMS server. It allows remote attackers to gain root access on a Fedora Core 6 system with exec-shield enabled. The exploit uses the method used in the proftpd exploit to avoid random mapping libraries. The size of this exploit is 115Kb more than Kaveh Razavi's exploit.

Recent Exploits: