header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IntelliTamper web analysis ( *.Map File Handling Local Exploit )

This exploit is for IntelliTamper v2.07. It creates a file with a buffer of 1024 bytes, with the last 23 bytes containing shellcode that downloads and runs an executable file. The exploit is coded in C and uses memset, memcpy, and fputc functions.

BroadWin WebAccess SCADA/HMI Remote Code Execution Vulnerability [0day]

WebAccess is the first fully web browser-based software package for human-machine interfaces (HMI), and supervisory control and data acquisition (SCADA). bwocxrun.ocx ActiveX component is prone to a remote code execution vulnerability by combination of some ActiveX methods to creating a arbitrary file in arbitrary location. The following exploit take advantage of windows WMI and .mof files to execute arbitrary code on the target machine.

phpListPro <= 2.0.1 Remote Command Execution Exploit

This exploit allows an attacker to execute arbitrary commands on a vulnerable system. It requires the magic_quotes_gpc setting to be off. The exploit injects malicious code into the log files of the vulnerable system, which is then executed when the log file is accessed.

libextractor <= 0.5.13 Multiple Heap Overflow PoC Exploits

libextractor is prone to multiple heap-based buffer-overflow vulnerabilities because it fails to perform boundary checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

RealVNC 4.1.0 – 4.1.1 (VNC Null Authentication) Vulnerability Scanners

This vulnerability allows an attacker to bypass authentication on RealVNC 4.1.0 - 4.1.1. The vulnerability is due to a lack of authentication when connecting to the VNC server. An attacker can exploit this vulnerability to gain access to the VNC server without authentication.

Recent Exploits: