header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Photodex ProShow Producer v5.0.3310 – Local Buffer Overflow (SEH)

This exploit targets a vulnerability in Photodex ProShow Producer v5.0.3310. It uses a jump to an offset of ESP instead of an egghunter. The seh exploit looks like this: shellcode-->junk-->next seh-->seh-->jumpcode. The exploit replaces a file in the app folder.

deV!Lz Clanportal SQL Injection Vulnerability

The deV!Lz Clanportal application is prone to an SQL injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

GNU Tar Directory Traversal Vulnerability

GNU Tar is prone to a vulnerability that may allow an attacker to place files and overwrite files in arbitrary locations on a vulnerable computer. These issues present themselves when the application processes malicious archives. A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. Successful exploits may aid in further attacks.

Build a TCP packet – based on tcp1.c sample code from libnet-1.1.1

This code is used to build a TCP packet based on the tcp1.c sample code from libnet-1.1.1. It allows an attacker to inject malicious code into the target system through a TCP connection. The code can be compiled and executed with specific parameters to send packets with modified sequence numbers. This can be used for various purposes, including resetting TCP connections and potentially disrupting network communication.

SpotLight CRM 1.0 (login.asp) | Remote SQL Injection Vulnerability

The SpotLight CRM 1.0 web application is vulnerable to remote SQL injection. An attacker can exploit this vulnerability by sending a specially crafted SQL query through the login.asp page. This allows the attacker to manipulate the database and potentially gain unauthorized access to sensitive information.

LD_PRELOAD Exploit in initscript

This exploit takes advantage of a vulnerability in the LD_PRELOAD environment variable to execute arbitrary code. It specifically targets the initscript file on Red Hat 6.0 and potentially other systems. It creates a file called /etc/initscript and modifies its contents to copy /bin/bash to /var/tmp/.nothing, set the setuid bit on /var/tmp/.nothing, and then remove /etc/initscript.

Recent Exploits: