header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OTSTurntables 1.00.028 (m3u/ofl) Local BOF Exploit (SEH)

This exploit is a buffer overflow vulnerability in OTSTurntables version 1.00.028. The vulnerability can be exploited locally by using a specially crafted m3u or ofl file. By exploiting this vulnerability, an attacker can gain control of the affected system and execute arbitrary code.

CA Internet Security Suite 2010 KmxSbx.sys Kernel Pool Overflow 0-day Exploit

The KmxSbx.sys kernel driver in CA Internet Security Suite 2010 is vulnerable to a pool corruption vulnerability in the handling of IOCTL 0x88000080. This allows an attacker with local access to execute arbitrary code within the kernel.

Xion Audio Player 1.0.127 (m3u) Buffer Overflow Vulnerability

The Xion Audio Player version 1.0.127 is vulnerable to a buffer overflow vulnerability when parsing m3u files. This vulnerability can be exploited by an attacker to execute arbitrary code on the target system. The exploit code provided in the script triggers the buffer overflow and executes a bind shell payload on port 4444.

Cpanel 11.X Edit E-mail Cross Site Request Forgery exploit

This exploit allows an attacker to perform unauthorized actions on behalf of a user by tricking them into clicking a specially crafted link or visiting a malicious website. In this case, the exploit targets the Cpanel 11.X Edit E-mail feature.

Windows Task Scheduler Privilege Escalation 0day

This exploit allows an attacker to escalate their privileges on a Windows system using a 0day vulnerability in the Task Scheduler. The exploit takes advantage of a flaw in the scheduler's handling of certain scripts, allowing the attacker to execute arbitrary code with elevated privileges. The vulnerability has not been assigned a CVE identifier.

Native Instruments Kontakt 4 Player NKI File Syntactic Analysis Buffer Overflow PoC

Kontakt Player 4 suffers from a buffer overflow vulnerability when parsing ".nki" files. The application fails in boundary checking of the user input resulting in a crash. The attacker can leverage from this scenario to execute arbitrary code on the affected system. Failed attempts will result in denial of service.

Microsoft Visual Studio 6.0 Sp6 Malformed .dbp File BoF Exploit

A Buffer Overflow Vulnerability exists in Microsoft Visual Studio 6.0 (with latest Service Pack 6) and Microsoft Development Environment 6.0 (SP6) (Microsoft Visual InterDev 6.0) due to a malformed .dbp file. This vulnerability can be exploited by an attacker to execute arbitrary code or cause a denial of service.

Recent Exploits: