header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

AddressSanitizer SEGV in pdfium

The exploit encountered a segmentation fault (SEGV) at an unknown address while fuzzing a PDF file in pdfium, the Chrome PDF renderer. The crash occurs in the IsFlagSet function in the v8/src/heap/spaces.h file. It seems to be related to incremental marking in the heap.

Heap Buffer Overflow in pdfium

The crash occurs in pdfium during PDF fuzzing. It is a heap buffer overflow issue encountered while rendering a PDF file. The issue is in the CPDF_DIBSource::DownSampleScanline32Bit function in the fpdf_render_loadimage.cpp file. The function tries to read 1 byte of data from the address 0x61800000f7b2, causing a heap buffer overflow.

IE 6 / DB Software Laboratory VImpX ActiveX (VImpX.ocx v. 4.7.3.0) Remote Buffer Overflow Exploit

This is a remote buffer overflow exploit for the IE 6 / DB Software Laboratory VImpX ActiveX (VImpX.ocx v. 4.7.3.0) vulnerability. It targets Windows XP SP2 IT version using the EIP overwrite method. The exploit is created by rgod.

notepad++[v4.1]: (win32) ruby file processing buffer overflow exploit

notepad++ contains a buffer overflow vulnerability in the way it processes ruby source files (.rb). This exploit works by overwriting EAX which gets called during processing as 'CALL DWORD EAX+4', so EAX needs to point to a user-controlled area that contains another address which will then become EIP. Once EIP is controlled it simply jumps a little bit forward in memory to the nop sled/shellcode.

KiTTY Portable <= 0.65.0.2p Chat Remote Buffer Overflow (SEH WinXP/Win7/Win10)

A remote overflow exists in the KiTTY Chat feature, which enables a remote attacker to execute code on the vulnerable system with the rights of the current user, from Windows XP x86 to Windows 10 x64 included (builds 10240/10586). Chat feature is not enabled by default. When sending a long string to the KiTTY chat server as nickname, a crash occurs. The EIP overwrite does let little room for exploitation (offset 54) with no more than 160 to 196 bytes for the shellcode from XP to Windows10. Using a Metasploit

Recent Exploits: