header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Remote Denial-of-Service Vulnerability in Mosh

The Mosh application is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue by sending specific input to the affected application, causing it to crash or enter an endless loop. This denial-of-service attack can result in a denial of service for legitimate users of the application.

ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)

This exploit targets a vulnerability in ProFTPD version 1.3.0 and 1.3.0a. The vulnerability is present in the mod_ctrls module and can be exploited locally. By exploiting this vulnerability, an attacker can execute arbitrary code with elevated privileges. The exploit uses the exec-shield technique to bypass security measures.

OpenFTPD Format String Exploit

This exploit targets a format string bug in the OpenFTPD software. The exploit allows for remote code execution by hijacking the jumpslot for fclose() and using the retaddr from argv[3] to execute arbitrary code. The shellcode is passed through the 'site msg' command, specifically the 'site msg read X' command, where X is the shellcode. This exploit has been tested on the most current version of OpenFTPD.

QDBlog v0.4 – MULTIPLE VULNERABILITIES

The QDBlog v0.4 application is vulnerable to SQL Injection and Local File Inclusion attacks. The SQL Injection vulnerability allows an attacker to bypass the admin access authentication and gain unauthorized access to the administration panel. The Local File Inclusion vulnerability allows an attacker to include arbitrary local files, potentially leading to remote code execution or information disclosure.

filezilla 3.11.0.2 sftp module denial of service vulnerability

SFTP module for FileZilla, based on Putty's PSFTP component, is vulnerable to a denial of service attack. When performing the SSH DH group exchange old style, if the server sends a malformed DH group exchange reply, it can cause the FileZilla component to crash.

[PoC] 79 Exes’s / IE NCTAudioFile2.AudioFile ActiveX Remote Stack Overfl0w

This exploit takes advantage of a stack overflow vulnerability in the NCTAudioFile2.AudioFile ActiveX component in Internet Explorer. By visiting a malicious webpage, an attacker can trigger the stack overflow and execute arbitrary code.

ProFTPD 1.3.5 Mod_Copy Command Execution

This module exploits the SITE CPFR/CPTO commands in ProFTPD version 1.3.5. Any unauthenticated client can leverage these commands to copy files from any part of the filesystem to a chosen destination. The copy commands are executed with the rights of the ProFTPD service, which by default runs under the privileges of the 'nobody' user. By using /proc/self/cmdline to copy a PHP payload to the website directory, PHP remote code execution is made possible.

Recent Exploits: