header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

UltraISO 9.7.1.3519 – Local Buffer Overflow (SEH)

This exploit takes advantage of a local buffer overflow vulnerability in UltraISO version 9.7.1.3519. By generating a specially crafted exploit.txt file and pasting its contents under 'Output FileName' in the application, an attacker can execute arbitrary code on the target system.

R i386 3.5.0 – Local Buffer Overflow (SEH)

This exploit takes advantage of a local buffer overflow vulnerability in R i386 version 3.5.0. By pasting the exploit code in the 'Gui Preferences' section of the application, an attacker can execute arbitrary code, in this case opening the calculator. The exploit uses a SEH exploitation method and has been tested on Windows XP Prof SP3 ENG x86.

10-Strike Network Inventory Explorer 8.54 – Local Buffer Overflow (SEH)(DEP Bypass)

This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in 10-Strike Network Inventory Explorer version 8.54. By creating a specially crafted file and opening it in the application, an attacker can trigger the vulnerability and gain control over the target system. This exploit bypasses DEP (Data Execution Prevention) by manually creating a ROP (Return Oriented Programming) chain. The exploit was originally discovered by Hashim Jawad and the proof of concept code was published on Exploit Database (EDB: 44838).

HTML5 Video Player 1.2.5 – Local Buffer Overflow – Non SEH

This exploit targets a buffer overflow vulnerability in HTML5 Video Player 1.2.5. By pasting a specially crafted payload into the 'KEY CODE' field under the 'Register' section of the application, an attacker can trigger a buffer overflow and execute arbitrary code. This exploit does not require SEH exploitation. The exact details of the vulnerability are yet to be determined by Mitre.

ResourceSpace <=8.6 'collection_edit.php' SQL Injection

The 'collection_edit.php' page in ResourceSpace version 8.6 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by injecting malicious SQL code through the 'keywords' parameter.

Faleemi Desktop Software 1.8 – Local Buffer Overflow (SEH)(DEP Bypass)

The Faleemi Desktop Software 1.8 is vulnerable to a local buffer overflow, which can be exploited to bypass DEP and gain control of the system. By opening the software and pasting specific contents into a field, an attacker can execute arbitrary code and pop a calculator.

Recent Exploits: