header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Avast aswMon2.sys kernel memory corruption and Local Privilege Escalation

Avast's aswMon2.sys Driver does not sanitize user supplied input IOCTL, leading to a kernel memory corruption that propagates on the system with a BSOD and potential risk of Privilege Escalation.

DataTrac Activity Console DoS Exploit

The DataTrac Activity Console is vulnerable to a Denial of Service (DoS) attack. This exploit sends a malicious procedure to the server, causing it to become unresponsive and effectively denying service to legitimate users. The exploit code is written in C and uses the winsock2 library for network communication. It resolves the host, establishes a connection, and sends the bad procedure, resulting in the server being DoS'ed.

Sun Solaris 10 RPC dmispd Remote Resource Consumption Exploit

This exploit targets the Sun Solaris 10 RPC dmispd service, causing it to consume excessive resources. The exploit is executed by restarting the dmi service, which triggers the resource consumption. The exploit is demonstrated with a command sequence and the resulting resource usage is shown. The exploit was developed by Jeremy Brown and was published in September 2009.

VLC Media Player 1.0.2 smb:// URI Handling Remote Stack Overflow PoC

This is a proof-of-concept exploit for a remote stack overflow vulnerability in VLC Media Player version 1.0.2. The vulnerability occurs when handling smb:// URIs. By sending a specially crafted URI, an attacker can trigger a stack overflow and potentially execute arbitrary code on the target system.

JiRo? FAQ Manager v1.0 (index.asp) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'tID' parameter to '/index.asp' script. A remote attacker can send a specially crafted request to the vulnerable script and execute arbitrary SQL commands in application's database, cause denial of service, access or modify sensitive data, exploit latent vulnerabilities in the underlying database and compromise the system.

Recent Exploits: