header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

VLC Media Player 1.0.01.0.1 smb:// URI Handling Remote Stack Overflow PoC

This is a proof of concept exploit for the vulnerability in VLC Media Player version 1.0.0 and 1.0.1. It exploits a remote stack overflow vulnerability in the handling of smb:// URIs. By sending a specially crafted URI, an attacker can cause a stack overflow and potentially execute arbitrary code on the target system.

FTPShell Client, Name Session Stack Overflow Exploit

This exploit targets the FTPShell Client version 4.1 RC2 on Windows XP SP3. It exploits a stack overflow vulnerability in the 'Name Session' feature of the program. The exploit code contains a shellcode for executing the 'calc.exe' program. The exploit is coded by 'zec' and can be contacted at zec@bsdmail.com.

2WIRE GATEWAY AUTHENTICATION BYPASS & PASSWORD RESET

There is an authentication bypass vulnerability in page=CD35_SETUP_01 that allows you to set a new password even if the password was previously set. By setting a new password with more than 512 characters, the password gets reset and next time you access the router you will be prompted for a new password.

ecl-winipdos

When processing an IP packet with an option size (2nd byte after the option) of 39, it will crash due to an off-by-one error. The maximum available size for the whole IP options field is 40, and two bytes are already used. Checks are done to validate that the option size field is less than 40, but a value of 39 is not checked properly. This vulnerability does not affect all options and is dependent on the underlying protocol.

Embedthis Appweb Remote Stack Buffer Overflow Poc

This is a proof of concept for a remote stack buffer overflow vulnerability in Embedthis Appweb. The vulnerability occurs when processing debugging information in the application. By sending a specially crafted request, an attacker can overflow the stack and potentially execute arbitrary code. This vulnerability has been identified in the ASM instructions provided.

Recent Exploits: