header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Citadel/UX remote exploit

A buffer overflow vulnerability exists in Citadel/UX when processing the USER parameter, which can lead to a denial of service (DoS) condition. The vulnerability was discovered by CoKi and a proof-of-concept exploit was developed. The exploit is not straightforward due to the presence of the tolower() function, but ret-to-libc technique can be used on certain systems.

SoundTouch multiple vulnerabilities

The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 can cause a denial of service(infinite loop and CPU consumption) via a crafted wav file.The TDStretch::acceptNewOverlapLength function in source/SoundTouch/TDStretch.cpp in SoundTouch 1.9.2 can cause a denial of service(memory allocation error and application crash) via a crafted wav file.

Nessus Vulnerability Scanner 3.0.6 ActiveX 0day Remote Code Execution Exploit

This exploit allows remote code execution on systems running Nessus Vulnerability Scanner 3.0.6. The bug was discovered by Krystian Kloskowski (h07) and was tested on Nessus 3.0.6 with IE 6 on Windows XP SP2 (Polish). The exploit injects a command to shut down the system with a delay of 1000 milliseconds and displays the message 'hello world ;]'. It then saves a file named 'exec.bat' in a specific directory.

PK5001Z CenturyLink Router/Modem remote root exploit

This exploit allows an attacker to gain remote root access to a PK5001Z CenturyLink Router/Modem. The exploit leverages a vulnerability in the router's firmware to execute arbitrary code and gain root privileges. By sending a specially crafted payload, the attacker can bypass authentication and gain full control over the device.

Recent Exploits: