header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Perl IMAP Server Remote Buffer Overflow

This exploit is a proof of concept for a remote buffer overflow vulnerability in a Perl IMAP server. The exploit takes advantage of a vulnerability in the server's handling of user credentials, allowing an attacker to execute arbitrary code on the server. The exploit uses a combination of NOP sled, return address overwrite, and a shellcode payload to achieve remote code execution. The shellcode used in the exploit is a modified version of the NGS Writing Small Shellcode by Dafydd Stuttard, with changes made to the bind port and added bytes to hide the cmd.exe window on the remote host.

Multiple input-validation vulnerabilities in Spyce

The vulnerabilities in Spyce can lead to information disclosure or client-side script execution. An attacker can execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, launch other attacks, and obtain a server's webroot path.

Simple E-Document Arbitrary File Upload

This module exploits a file upload vulnerability found in Simple E-Document versions 3.0 to 3.1. Attackers can bypass authentication and abuse the upload feature in order to upload malicious PHP files which results in arbitrary remote code execution as the web server user. File uploads are disabled by default.

PCMAN FTP 2.07 CWD Command Buffer Overflow

This exploit takes advantage of a buffer overflow vulnerability in the CWD command of PCMAN FTP version 2.07. By sending a specially crafted string as the argument to the CWD command, an attacker can overwrite the function with junk characters, leading to remote code execution. The exploit includes a shellcode that binds a shell to port 4444.

Recent Exploits: