header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Bradabra v2.0.5 Remote File Include Vulnerability

The vulnerability allows an attacker to include a remote file in the 'includes.php' file of the Bradabra v2.0.5 script. By manipulating the 'include_path' parameter, an attacker can include a malicious file from a remote server, potentially leading to remote code execution.

MOAB-19-01-2007

This exploit is a JavaScript code that creates an iframe with a source URL that starts with 'ftps://' followed by a string of 408 'A' characters and 'ABCD'. It appends the iframe to a hidden div element with the id 'testbox'. When the 'Test MOAB-19-01-2007' button is clicked, the payload size is displayed in an alert and the iframe is loaded.

PoC exploit for .HPJ project files buffer overflow vulnerability in Microsoft Help Workshop v4.03.0002

This is a proof-of-concept exploit for a buffer overflow vulnerability in Microsoft Help Workshop v4.03.0002. The vulnerability allows an attacker to execute arbitrary code by creating a specially crafted .HPJ project file. The exploit code spawns a process of notepad.exe and contains hardcoded offsets and API pointers to perform the exploit.

PoC exploit for Intel Centrino ipw2200 integrated wireless card

This is a Proof of Concept stack based exploit that demonstrates remote code execution on the ipw2200 driver. It executes a beep user space shellcode. It only works on XP SP2 ITA and it was only tested with version 8.0.12.20000 of the IPW2200BG driver.

KingScada kxClientDownload.ocx ActiveX Remote Code Execution

This module abuses the kxClientDownload.ocx ActiveX control distributed with WellingTech KingScada. The ProjectURL property can be abused to download and load arbitrary DLLs from arbitrary locations, leading to arbitrary code execution, because of a dangerous usage of LoadLibrary. Due to the nature of the vulnerability, this module will work only when Protected Mode is not present or not enabled.

FTP LIST heap buffer overflow

This script demonstrates a heap buffer overflow vulnerability in the FTP LIST command. It sends a payload of 251 bytes followed by specific values to trigger the overflow. This vulnerability allows an attacker to potentially execute arbitrary code or crash the FTP server.

Recent Exploits: