header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Google SketchUp <= v7.1.6087 'lib3ds' 3DS Importer Memory Corruption

Google SketchUp is prone to a memory-corruption vulnerability when handling specially crafted 3DS files. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

IE ActiveX remote bof (remote code excution)

This exploit uses a buffer overflow vulnerability in Internet Explorer's ActiveX control to execute arbitrary code. The exploit code is written in VBScript and uses the 'target.Exec' command to execute a program of the attacker's choice. In this case, the program is 'calc.exe' which is located in the Windows system32 directory.

Sub Station Alpha v4.08 .rt file local buffer overflow poc

This is a proof-of-concept exploit for a local buffer overflow vulnerability in Sub Station Alpha v4.08 .rt file. The exploit is written in C and creates a malicious .rt file with a size of 109 bytes of header, 154 bytes of tail and a variable amount of NOPs in between. The malicious file is then written to the disk.

Max’s File Uploader

Max's File Uploader is vulnerable to a remote file upload vulnerability. An attacker can upload a malicious file to the server, which can be used to gain access to the server. The attacker can use the Dork to find the vulnerable website and then use the exploit to upload a malicious file to the server. The malicious file can then be accessed via the path maxFileUpload/shell.php.

BS.Player v2.51

A SEH overwrite vulnerability exists in BS.Player v2.51. An attacker can exploit this vulnerability by creating a malicious .bsi file containing a specially crafted Skin option with a large number of 'A' characters followed by four 'B' characters and four 'C' characters. When the file is opened, the SEH handler will be overwritten with the 'C' characters, allowing the attacker to execute arbitrary code.

OtsTurntables Free v1.00.047 SEH Overwrite POC

A buffer overflow vulnerability exists in OtsTurntables Free v1.00.047. An attacker can exploit this vulnerability by sending a specially crafted file with a large amount of data to the application, resulting in a SEH overwrite. This can allow an attacker to execute arbitrary code in the context of the application.

ScaryMovie Exploit Study

There is a widespread failure in the way that (.MOV) files are handled by the Quicktime Library. Nearly every (.MOV) enabled application that I tested fell victim to this exploit. This is a local memory corruption vulnerability in the way these programs process a malformed file. Memory Corruption is repeatable and code execution seems possible. Because this issue affects web browsers it seems that the attack vector will be both Local and Remote.

Recent Exploits: