header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Portable E.M Magic Morph 1.95b .MOR File Stack Buffer Overflow POC

This is a proof of concept for a stack buffer overflow vulnerability in Portable E.M Magic Morph 1.95b. By creating a specially crafted .MOR file and editing it with a hex editor, an attacker can trigger a stack buffer overflow. The EIP offset is at 312 bytes (0x138 HEX). The exploit uses a technique called 'stack spray' to determine the offset. The CPU registers at the time of the exploit are: EAX=00000000, ECX=33333333, EDX=01492288, EBX=00000001, ESP=0012EF7C. The exploit payload is a string of characters and symbols.

FilePocket v1.2 Local Proxy Password Disclosure Exploit

This exploit allows local users to disclose proxy passwords in FilePocket v1.2 and possibly prior versions. The exploit leverages a vulnerability in the software that allows access to the proxy password through the Windows registry.

Pidgin MSN <= 2.5.8 Remote Code Execution

This is an exploit for the vulnerability discovered in Pidgin by core-security. The library "libmsn" used by pidgin doesn't handle specially crafted MsnSlp packets which could lead to memory corruption.

FTPShell Client 4.1 RC2 Remote Buffer Overflow Exploit

This exploit takes advantage of a buffer overflow vulnerability in FTPShell Client 4.1 RC2. By sending a malicious pasv response, an attacker can trigger the buffer overflow and potentially execute arbitrary code on the target system. The exploit has been tested on Windows XP SP3 and Windows 2000 SP4.

Audio Lib Player m3u SEH overwrite

This exploit takes advantage of a SEH (Structured Exception Handling) overwrite vulnerability in Audio Lib Player. By creating a specially crafted playlist file (exploit.m3u) and loading it into the player, an attacker can trigger the exploit and gain control of the program, potentially allowing for remote code execution.

Recent Exploits: