header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oracle 9i XDB FTP PASS Overflow (win32)

By passing an overly long string to the PASS command, a stack based buffer overflow occurs. David Litchfield, has illustrated multiple vulnerabilities in the Oracle 9i XML Database (XDB), during a seminar on "Variations in exploit methods between Linux and Windows" presented at the Blackhat conference.

PHPWebSite <= 0.10.2 Remote Command Execution

This vulnerability allows an attacker to include files from local resources, which can lead to arbitrary code execution. The vulnerable code is present in the index.php file of PHPWebSite version 0.10.2 and below. By manipulating the 'hub_dir' parameter in the URL, an attacker can include files from local resources.

FTPPad 1.2.0 Stack Buffer Overflow

This module exploits a stack buffer overflow FTPPad 1.2.0 ftp client. The overflow is triggered when the client connects to a FTP server which sends an overly long directory and filename in response to a LIST command. This will cause an access violation, and will eventually overwrite the saved extended instruction pointer. Payload can be found at EDX+5c and ESI+5c, so a little pivot/sniper was needed to make this one work.

Recent Exploits: