header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Explorer 6 Heap Overflow

A small heap overflow occurs each time this property is set. The bug is difficult to detect unless heap verification has been enabled in the global debug flags for iexplore.exe. The demonstration below results in a possibly exploitable heap corruption after 128 or more iterations of the property set.

Internet Explorer 6 DOM-Hanoi Fuzzer Script Vulnerability

The vulnerability exists due to a boundary error when handling certain combinations of elements in a DOM tree. An attacker can exploit this vulnerability by creating a malicious web page containing a specially crafted combination of elements and then convincing a user to view the page. This can result in a buffer overflow, allowing the attacker to execute arbitrary code on the user's system with the privileges of the user.

An attacker can gain reseller privileges and after that can gain admin privileges

An attacker can gain reseller privileges and after that can gain admin privileges by exploiting a bug in the hosting/addreseller.asp file of HostingController 6.1 Hotfix <= 3.1. The bug allows an attacker to inject malicious code into the file, which can be used to gain access to the system. The attacker can then use the code to gain access to the system and gain admin privileges.

Microsoft Office Excel 2003 Hlink Stack/SEH Overflow Exploit

This exploit was originally written by Manuel Santamarina Suarez, but it was working by clicking on the link and then on the 'Yes' button. In this version of exploit the author adds the RET address for Microsoft Office Excel 2003 (Italian; 11.5612.5606) and removed user confirmation by 'Yes' button. The exploit now simply works by clicking on the link.

WinRAR – Stack Overflows in SelF – eXtracting Archives

This exploit is a stack overflow vulnerability in WinRAR 3.60 beta 4. It allows an attacker to execute arbitrary code by creating a malicious SFX archive. The malicious SFX archive contains a comment.txt file which contains the malicious code and a sample.exe file which contains the shellcode. When the SFX archive is opened, the malicious code is executed.

WonderEdit Pro CMS <= Pro version Remote File Include Vulnerabilities

A vulnerability exists in WonderEdit Pro CMS Pro version, which allows attackers to include remote files. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious code to the vulnerable application. This can result in arbitrary code execution on the vulnerable system.

galleria <= 1.0 Remote File InclusionVulnerability

A Remote File Inclusion vulnerability exists in the galleria component of Joomla! 1.0. An attacker can exploit this vulnerability to execute arbitrary PHP code on the vulnerable system by sending a specially crafted HTTP request containing a malicious URL. The malicious URL contains the path to the vulnerable file and the malicious PHP code to be executed.

Recent Exploits: