header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Deepin TFTP Server Directory Traversal Vulnerability

Deepin TFTP Server does not properly sanitise filenames containing directory traversal sequences that are received from an FTP client. An attacker can use this vulnerability to gain access to sensitive files on the server. Proof of concept code is provided to demonstrate the vulnerability. Exploit code is provided to demonstrate how an attacker can use this vulnerability to gain access to sensitive files on the server.

Microsoft Windows Contacts DLL Hijacking Exploit (wab32res.dll)

This exploit allows an attacker to execute arbitrary code on a vulnerable system by hijacking a Windows Contacts DLL file. The vulnerable file is wab32res.dll, which is used to open .contact, .group, .p7c, .vcf, and .wab files. The exploit code is written in C and compiled into a shared library. When the vulnerable file is loaded, the malicious code is executed.

Adobe InDesign CS4 DLL Hijacking Exploit (ibfs32.dll)

Adobe InDesign CS4 is vulnerable to DLL Hijacking. An attacker can exploit this vulnerability by placing a malicious DLL file in the same directory as the vulnerable application. When the vulnerable application is executed, the malicious DLL will be loaded and executed instead of the legitimate DLL.

Cisco Packet Tracer 5.2 DLL Hijacking Exploit (wintab32.dll)

Cisco Packet Tracer 5.2 is vulnerable to DLL Hijacking. The exploit code includes a set of functions that are exported from the wintab32.dll library. These functions are used to hijack the application and execute arbitrary code. The exploit code is written in C and is compiled as a DLL. The exploit code is then used to hijack the application and execute arbitrary code.

Adobe On Location CS4 DLL Hijacking Exploit (ibfs32.dll)

This exploit is related to Adobe On Location CS4 DLL Hijacking vulnerability. It is a type of vulnerability that occurs when an application looks for a specific DLL to perform a certain task, but an attacker provides a malicious DLL instead. This malicious DLL is then executed instead of the legitimate DLL, allowing the attacker to gain control of the application. The vulnerable extension in this exploit is .olproj.

Adobe Premier Pro CS4 DLL Hijacking Exploit (ibfs32.dll)

This exploit is related to Adobe Premier Pro CS4 DLL Hijacking vulnerability. It allows an attacker to execute arbitrary code by placing a malicious DLL file in the same directory as the vulnerable application. The vulnerable application will then load the malicious DLL instead of the legitimate one.

Flash Movie Player v1.5 File Magic Crash

Flash Movie Player is a free stand-alone player for ShockWave Flash (SWF) animations, based on the Macromedia Flash Player plugin. A buffer overflow vulnerability exists in the software when a specially crafted SWF file is processed, allowing an attacker to execute arbitrary code. The vulnerability is triggered when the first byte of a SWF file is replaced with any other character.

Mediaplayer Classic 1.3.2189.0 Dll Hijack Exploit

Compile the following code and rename it to iacenc.dll and place file with one of the affected types in the same directory of the dll. Affected types: m2ts, m2t, flv, hdmov, 3gpp,3gp, mpeg, mp4v, mkv, m2v,rm , ram (i guess all file types that mpc supports are affected).

Recent Exploits: