header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

CVE-2017-1000486 Primefaces Remote Code Execution Exploit

This module exploits an expression language remote code execution flaw in the Primefaces JSF framework. Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt.

0-day EDraw Office Viewer Component 5.2 (officeviewer.ocx v. 5.2.218.1) “HttpDownloadFileToTempDir()” Remote Buffer Overflow

This exploit targets the EDraw Office Viewer Component version 5.2 (officeviewer.ocx v. 5.2.218.1) through the "HttpDownloadFileToTempDir()" method. It allows an attacker to overflow a buffer remotely, potentially leading to arbitrary code execution.

Out-of-Bounds Write Vulnerability

This exploit demonstrates an Out-of-Bounds Write vulnerability in Chakra. The vulnerability occurs due to a flaw in the loop prepass analysis, where a relative operation is mistakenly considered a valid loop. This leads to an optimization phase where the relative operation is optimized and becomes a load operation, resulting in an Out-of-Bounds Write. An attacker could exploit this vulnerability to execute arbitrary code or modify sensitive data.

RW::Download v2.0.3 lite – Remote SQL Injection

The RW::Download v2.0.3 lite web application is vulnerable to remote SQL injection. An attacker can exploit this vulnerability by manipulating the 'dlid' and 'cid' parameters in the 'index.php' file. By using a UNION SELECT statement, the attacker can extract sensitive information such as usernames and passwords from the 'dl_users' table.

Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library (FPOLE.OCX v. 6.0.8450.0) Remote Stack Overflow

This exploit takes advantage of a remote stack overflow vulnerability in Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library (FPOLE.OCX v. 6.0.8450.0). By sending a specially crafted request, an attacker can trigger a stack overflow and potentially execute arbitrary code on the target system.

Trend Micro ServerProtect eng50.dll Stack Overflow

A boundary error within a function in eng50.dll can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the SpntSvc.exe service.

AtomixMP3 2.3 (pls File) Local Buffer OverFlow

The exploit generates a malicious pls file for AtomixMP3 2.3 that triggers a local buffer overflow. It utilizes a return address at 0x77394540, jmp esp instruction in mswsock.dll on Windows XP Pro Version 2002. The exploit payload consists of padding (A x 516), the EIP overwrite with a jmp esp instruction, some NOPs, and a shellcode. The shellcode is a Windows command to execute the calculator program. The exploit was created by 0x58 and gives credit to miyyet, diablos5s5, vxroot, Str0ke, and Metasploit.

Recent Exploits: