header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Linux sock_sendpage() NULL pointer dereference

This exploit demonstrates the exploitability of the sock_sendpage() NULL pointer dereference vulnerability on ppc and ppc64 architectures. It utilizes the SELinux and mmap_min_addr issues to exploit the vulnerability on Red Hat Enterprise Linux 5.3 and CentOS 5.3. The vulnerability affects Linux kernel versions from 2.4.4 to 2.4.37.4, and from 2.6.0 to 2.6.30.4.

Yager <= 5.24 Remote Buffer Overflow Exploit

This exploit takes advantage of a buffer overflow vulnerability in the Yager game version 5.24. It allows an attacker to execute arbitrary code on the target system by sending a specially crafted packet. The exploit targets the binkw32.dll library in Windows XP Pro SP1 GER.

ProShow Producer //ProShow Gold v 4.0.2549(.psh) Universal Local BOF SEH

This exploit allows an attacker to execute arbitrary code or crash the ProShow Producer and ProShow Gold versions 4.0.2549 by creating a specially crafted .psh file. The vulnerability is caused by a buffer overflow in the parsing of the file header.

Media Jukebox 8 ( .M3U) Universal Local Buffer Exploit (SEH)

This exploit is for Media Jukebox 8 (.M3U) which is a universal local buffer overflow vulnerability. It exploits a SEH (Structured Exception Handling) vulnerability in the program. The exploit uses a combination of NOP sled and shellcode to gain control of the program's execution flow.

Recent Exploits: