header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

[Opera 7] Arbitrary File Auto-Saved Vulnerability

This Exploit will run a webserver that will create and execute a batch file on the victim's computer when visiting this malicious server. This perl script is a small HTTP server for a check ofthe vulnerability. BTW, you can exploit this vulnerability without a server like this if your apache or etc., allow a request URL that contains '..'.

Remote Exploit for mod_gzip (debug_mode) [Linux/*BSD]

This is a remote exploit for mod_gzip (debug_mode) on Linux/*BSD systems. It can be used in single mode or brute mode. In single mode, it connects to the target on port 80 and tries to connect to port 2003. In brute mode, it uses a step of 1000 and tries to connect to port 2003. If successful, it will give a shell access to the target.

Windows 2000/XP/2003 Remote Exploit

This exploit is a private version of a public exploit posted to packetstorm. It is a buffer overflow exploit that targets Windows 2000/XP/2003 systems. It crashes the 'services.exe' process when the user exits from the shell. The exploit is written in C and uses the Winsock2 library.

local ListBox/ComboBox exploit for Win32

This exploit is used to exploit a buffer overflow vulnerability in ListBox/ComboBox controls in Win32 systems. It is created by xCrZx and was tested on WinXP. It requires the user to enter the handle addresses of the program handles, such as the handle of Edit/RichEdit/etc (to store shellcode) and the handle of ListBox/ComboBox. It then sets the shellcode and return addresses and sends the shellcode and exploit messages.

pileup-xpl.c – local root exploit

This exploit is based on code by Cody Tubbs (loophole of hhp) and is used to gain root access on a system. It uses a buffer overflow vulnerability to overwrite the return address of the program with the address of the shellcode. The exploit then executes the shellcode which sets the UID to 0 and copies a shell to /tmp/core and sets the permissions to 4555.

Recent Exploits: