header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Sun Java JRE getSoundbank file:// URI Buffer Overflow

This module exploits a flaw in the getSoundbank function in the Sun JVM. The payload is serialized and passed to the applet via PARAM tags. It must be a native payload. The effected Java versions are JDK and JRE 6 Update 16 and earlier, JDK and JRE 5.0 Update 21 and earlier, SDK and JRE 1.4.2_23 and earlier, and SDK and JRE 1.3.1_26 and earlier.

Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow (loop)

The LWRES dissector in Wireshark version 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allows remote attackers to execute arbitrary code due to a stack-based buffer overflow. This bug found and reported by babi. This particular exploit targets the dissect_getaddrsbyname_request function. Several other functions also contain potentially exploitable stack-based buffer overflows. The Windows version (of 1.2.5 at least) is compiled with /GS, which prevents exploitation via the return address on the stack. Sending a larger string allows exploitation using the SEH bypass method. However, this packet will usually get fragmented, which may cause additional complications.

Subversion Date Svnserve

This is an exploit for the Subversion date parsing overflow. This exploit is for the svnserve daemon (svn:// protocol) and will not work for Subversion over webdav (http[s]://). This exploit should never crash the daemon, and should be safe to do multi-hits. WARNING This exploit seems to (not very often, I've only seen it during testing) corrupt the subversion database, so be careful!

Chilkat Software FTP2 ActiveX Component (ChilkatFtp2.DLL 2.6.1.1) Remote Code Execution poc

This class allows to copy/overwrite files inside arbitrary locations ex. by the GetFile() method. This code creates a batch file inside the automatic startup folder, setup a ftp server allowing anonymous connections and place the code you want to be retrieved.

Ignition 1.3 (page) Local File Inclusion Vulnerability

Ignition 1.3 is vulnerable to Local File Inclusion (LFI) vulnerability. This vulnerability can be exploited by an attacker to include local files on the server. The attacker can send a specially crafted HTTP request containing directory traversal characters (e.g. '../') to the vulnerable page.php script in order to include local files from the web server. The vulnerability is due to insufficient sanitization of user-supplied input passed via the 'page' parameter. An attacker can exploit this vulnerability to include local files from the web server and execute arbitrary code on the vulnerable system.

Recent Exploits: