header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Total Commander 8.52 Buffer Overflow

This exploit allows an attacker to create a buffer overflow in Total Commander 8.52. By executing a specially crafted python script, the attacker can create a file that triggers the buffer overflow when certain actions are performed in Total Commander. This can lead to remote code execution or denial of service.

Winamp <= 5.34 .MP4 File Code Execution

Winamp MP4's plugin fails to handle exceptional conditions, which can lead to code execution. However exploitation is hard, firstly because of the return address. This code exploits a call [eax], and it might be complicated to find a correct return address. Moreover, the bug doesn't always appear. I think one attempt out of 2 will success. I'm still working on it...

VBox Satellite Express Arbitrary Write Privilege Escalation

A vulnerability within the ndvbs module allows an attacker to inject memory they control into an arbitrary location they define. This vulnerability can be used to overwrite function pointers in HalDispatchTable resulting in an elevation of privilege.

IKEView R60 Buffer overflow(SEH) Local Exploit

This exploit takes advantage of a buffer overflow vulnerability in IKEView R60 to execute arbitrary code. By creating a specially crafted file and opening it with IKEView.exe, an attacker can trigger the overflow and open a bind tcp port at port 4444. The exploit has been tested on Windows XP Service Pack 2.

3proxy[v0.5.3g]: (linux) remote buffer overflow exploit

This exploit targets the 3Proxy tiny free proxy server version 0.5.3g on Linux. The vulnerability is found in the logurl() function in proxy.c, where a buffer overflow can occur if the 'Host: [FILLER]' string exceeds the buffer boundary. By crafting a specific payload consisting of [NOPS][SHELLCODE][RETADDR], an attacker can execute arbitrary code on the target system.

Recent Exploits: