header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Denial of Service

This exploit targets the PrecisionID Barcode ActiveX control version 1.9 in Internet Explorer 6. By sending a specially crafted input, an attacker can cause a denial of service condition. The exploit has been tested on Windows XP Professional SP2 with all patches applied and Internet Explorer 6. Other software that uses this ActiveX control may also be vulnerable.

Apple OS X and iOS Panic Log Information Disclosure Vulnerability

This vulnerability allows an attacker to access sensitive information from the panic log of Apple OS X and iOS. By exploiting this vulnerability, an attacker can gain insights into the system's state and potentially discover sensitive information such as passwords, cryptographic keys, or other confidential data.

Apple OS X and iOS Panic Log Vulnerability

This vulnerability allows an attacker to cause a panic in the OS X and iOS operating systems, resulting in a denial of service condition. It can be exploited by sending a specially crafted panic log to the target device. The vulnerability has been identified in OS X and iOS versions prior to the patched versions mentioned in the advisories.

IOKit device.defs Functions Error Handling

The _ool variations of the IOKit device.defs functions incorrectly handle error conditions. Specifically, the code declares an io_object_t existing on the stack and passes its address to the is_io_service_get_matching_services_ool function. If the function succeeds, the value of existing is passed to iokit_make_object_port.

Eudora 7.1 SMTP Response 0day Remote Buffer Overflow PoC Exploit

This exploit targets a buffer overflow vulnerability in Eudora 7.1.0.9. It allows an attacker to execute arbitrary commands on the target system. The exploit code is written in Python and includes a shellcode to execute the 'calc.exe' command on Windows systems. Note that this vulnerability can only be exploited if the user ignores the warning about the buffer overflow error.

Recent Exploits: