header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Samsung Internet Browser SOP Bypass

This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser, a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up.

Out-of-bounds read in jscript.dll library

There is an out-of-bounds read vulnerability in the jscript.dll library, which is used in Internet Explorer (IE), WPAD, and other places. The vulnerability can be triggered by a specially crafted regular expression. An attacker could exploit this vulnerability to read sensitive information or cause a denial of service.

MS07-046(GDI32.dll Integer overflow DOS) Proof Of Concept Code

This Proof of Concept (POC) code demonstrates an integer overflow vulnerability in the GDI32.dll library, which can cause a denial of service (DOS) condition. When an application reads a malformed Windows Meta File (WMF) like this POC, it crashes. By applying this code, an attacker can execute arbitrary code.

Use-After-Free in jscript.dll library in IE11

There is a use-after-free vulnerability in the jscript.dll library that can be exploited in IE11. The vulnerability occurs when calling the toString method of an argument in the JSONStringifyObject function. The return value of the toString method is not added to the garbage collector's root object list and can be freed during subsequent callbacks.

Advantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow

This module exploits a stack buffer overflow in Advantech WebAccess 8.2. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.

MSN messenger 7.x (8.0?) VIDEO Remote Heap Overflow Exploit

This exploit allows an attacker to remotely overflow the heap in MSN Messenger version 7.x (possibly 8.0). The exploit involves compiling a DLL, injecting it into the MSN Messenger process, and then sending a webcam invitation to a contact who is online. If the invitation is accepted, the target's MSN Messenger will crash. On a Chinese version of Windows 2000 SP4, it may also result in a reverse shell. The source code of the DLL needs to be adjusted for other versions of Windows 2000 by modifying the jmpa address.

Buffer overflow in glibc’s ld.so

We have discovered a memory leak and a buffer overflow in the dynamic loader (ld.so) of the GNU C Library (glibc). The memory leak (CVE-2017-1000408) first appeared in glibc 2.1.1 (released on May 24, 1999) and can be reached and amplified through the LD_HWCAP_MASK environment variable.

Recent Exploits: