header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CCRP Folder Treeview Control (ccrpftv6.ocx) Internet Explorer Denial of Service

The CCRP Folder Treeview Control (ccrpftv6.ocx) in Internet Explorer is vulnerable to a Denial of Service attack. By sending a specially crafted argument to the RootFolder parameter, an attacker can cause Internet Explorer to crash and become unresponsive. This vulnerability has been tested on Windows XP Professional SP2 with Internet Explorer 7.

Exploit for SAMI FTP version 2.0.2

You can put your own shellcode to spawn a shell. After executing the exploit, you will get 'Cannot login User or password not correct.' That doesn't mean the exploit failed. Whenever you click on Sami FTP server, it will crash resulting in the execution of calc.exe and will execute whenever the SAMI FTP server restarts until it is reinstalled.

Colloquy INVITE format string vulnerability exploit

This script makes use of the Colloquy INVITE format string vulnerability. It connects to an IRC server and joins a specified channel. It then sends a WHO command to the server to gather information about the users in the channel. This vulnerability can be exploited to execute arbitrary code.

recvmmsg.c – linux 3.4+ local root (CONFIG_X86_X32=y)

This exploit takes advantage of the x32 ABI with recvmmsg vulnerability (CVE-2014-0038) in Linux 3.4+ kernels. The exploit allows an attacker to gain root privileges on the target system. The vulnerability is caused by a flaw in the recvmmsg system call, which can be exploited to escalate privileges.

KGB <= 1.9 Remote Code Execution Exploit

This exploit allows an attacker to execute arbitrary code on a target system running KGB version 1.9. The vulnerability is due to insufficient input validation, which allows an attacker to inject and execute malicious code. This can lead to a complete compromise of the target system.

WebCT HTML-injection Vulnerability

WebCT is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content. Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials and to control how the site is rendered to the user; other attacks are also possible.

Recent Exploits: