Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Exploits 571 - exploit.company
header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Easy CD-DA Recorder PLS Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in Easy CD-DA Recorder 2007, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .PLS file, a remote attacker could execute arbitrary code on the system or cause the application to crash. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1.

Bradabra v2.0.5 Remote File Include Vulnerability

The vulnerability allows an attacker to include a remote file in the 'includes.php' file of the Bradabra v2.0.5 script. By manipulating the 'include_path' parameter, an attacker can include a malicious file from a remote server, potentially leading to remote code execution.

MOAB-19-01-2007

This exploit is a JavaScript code that creates an iframe with a source URL that starts with 'ftps://' followed by a string of 408 'A' characters and 'ABCD'. It appends the iframe to a hidden div element with the id 'testbox'. When the 'Test MOAB-19-01-2007' button is clicked, the payload size is displayed in an alert and the iframe is loaded.

PoC exploit for .HPJ project files buffer overflow vulnerability in Microsoft Help Workshop v4.03.0002

This is a proof-of-concept exploit for a buffer overflow vulnerability in Microsoft Help Workshop v4.03.0002. The vulnerability allows an attacker to execute arbitrary code by creating a specially crafted .HPJ project file. The exploit code spawns a process of notepad.exe and contains hardcoded offsets and API pointers to perform the exploit.

PoC exploit for Intel Centrino ipw2200 integrated wireless card

This is a Proof of Concept stack based exploit that demonstrates remote code execution on the ipw2200 driver. It executes a beep user space shellcode. It only works on XP SP2 ITA and it was only tested with version 8.0.12.20000 of the IPW2200BG driver.

Recent Exploits: