header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

iMesh <= 7.1.0.x IMWebControl Class (IMWeb.dll 7.0.0.x) remote heap exploit

iMesh is a file sharing and online social network. It uses a proprietary, centralized, P2P protocol. iMesh is owned by an American company iMesh, Inc. and maintains a development center in Israel. This vulnerability is caused by passing an empty value to ProcessRequestEx method. By hijacking the ECX register to an arbitrary value, an access violation can be triggered when reading 0D0D0D0D. This exploit adds an administrative account using various stages of heap spray.

Buffer Overflow in Stoneys FTPd

There exists a buffer overflow in Stoneys FTPd that most rxBot mod's use. The problem lies in how the code parses the PORT command and gives an opportunity for a buffer overflow. Problem is that the ftpd also uses select() to handle multiple connections. So when sending the crafted PORT command select() returns NULL making it return and exit the FTPd thread resulting merely in a Denial Of Service of the FTPd with no crash of the bot itself.

PhpTagCool Zatueritor 1.0

This exploit is a buffer overflow vulnerability in PhpTagCool Zatueritor 1.0. It allows an attacker to send malicious data to the application, which can cause the application to crash or execute arbitrary code. The vulnerability is caused by a lack of input validation, which allows an attacker to send malicious data to the application.

Class-1 Forum sql injection / remote code execution poc exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable server running Class-1 Forum. The attacker can send a specially crafted HTTP request to the vulnerable server, which will then execute the command specified in the request. The exploit requires the attacker to have knowledge of the server's path, hostname, port, and command to be executed.

Mozilla Firefox <= 1.0.6 (Host:) Buffer Overflow DoS String

The problem seems to be when a hostname which has all dashes causes the NormalizeIDN call in nsStandardURL::BuildNormalizedSpec to return true, but is sets encHost to an empty string. Meaning, Firefox appends 0 to approxLen and then appends the long string of dashes to the buffer instead. The following HTML code below will reproduce this issue: <A HREF=https:--------------------------------------------- >

Windows Console State Information Vulnerability

This exploit is a buffer overflow vulnerability in the Windows Console State Information. It allows an attacker to execute arbitrary code in the context of the current user. The vulnerability is caused by a lack of bounds checking when writing to the console state information structure. This can be exploited by an attacker to overwrite the return address of a function with a pointer to malicious code.

vBulletin Forum Backup File Disclosure Exploit

This exploit allows an attacker to download a backup file from a vulnerable vBulletin forum. The exploit works by sending a GET request to the vulnerable server for a backup file with a specific date string. The exploit supports five different date strings, which are used to support different international vBulletin forums. The exploit was first reported in 2005 and affects vBulletin versions prior to 3.6.7.

Recent Exploits: