ZipExplorer 7.0 Denial Of Service
ZipExplorer version 7.0 denial of service exploit that creates a malicious .rar file.
View ArticleWinamp 5.572 EIP / SEH DEP Bypass Buffer Overflow
Winamp 5.572 local buffer overflow EIP and SEH DEP bypass exploit.
View ArticleFieldNotes 32 5.0 SEH Overwrite
FieldNotes 32 version 5.0 SEH overwrite local exploit that produces a malicious .dxf file.
View ArticleVtiger CRM 5.0.4 Local File Inclusion
Vtiger CRM version 5.0.4 pre-authentication local file inclusion exploit.
View ArticleN'CMS 1.1E Pre-Auth Local File Inclusion Code Execution
N'CMS version 1.1e pre-authentication local file inclusion remote code execution exploit.
View ArticleIf-CMS 2.07 Local File Inclusion
If-CMS version 2.07 pre-authentication local file inclusion exploit.
View ArticleiCMS 1.1 SQL Injection / Bruteforcer
iCMS version 1.1 administrative SQL injection / bruteforcing exploit.
View ArticleVisiWave VWR File Parsing Buffer Overflow
This Metasploit module exploits a vulnerability found in VisiWave's Site Survey Report application. When processing .VWR files, VisiWave.exe attempts to match a valid pointer based on the 'Type'...
View ArticleVLC Media Player XSPF Local File Integer Overflow
VLC Media Player suffers from an XSPF local file integer overflow in the XSPF playlist parser. Versions 1.1.9 down to 0.8.5 are affected.
View ArticleIf-CMS 2.07 Local File Inclusion
If-CMS version 2.07 pre-authentication local file inclusion exploit that leverages the newlang parameter.
View ArticleJoomla 1.5 VirtueMart 1.1.7 Blind SQL Injection
A vulnerability was discovered by Rocco Calvi and Steve Seeley which identifies unauthenticated time-based blind SQL injection in the "page" variable of the virtuemart component. This vulnerability...
View ArticleMeasuresoft ScadaPro 4.0.0 Remote Command Execution
This Metasploit module allows remote attackers to execute arbitrary commands on the affected system by abusing a directory traversal attack when using the 'xf' command (execute function). An attacker...
View ArticleeSignal / eSignal Pro 10.6.2425.1208 Buffer Overflow
eSignal and eSignal Pro versions 10.6.2425.1208 and below suffer from a file parsing buffer overflow in QUO. Successful exploitation of this vulnerability may take up to several seconds due to the use...
View ArticleScriptFTP 3.3 Remote Buffer Overflow
AmmSoft's ScriptFTP client is susceptible to a remote buffer overflow vulnerability that is triggered when processing a sufficiently long filename during a FTP LIST command resulting in overwriting the...
View ArticleTugZip 3.5 Zip File Parsing Buffer Overflow
This Metasploit module exploits a stack-based buffer overflow vulnerability in the latest version 3.5 of TugZip archiving utility. In order to trigger the vulnerability, an attacker must convince...
View ArticlePcVue 10.0 Function Pointer Overwrite
This Metasploit module exploits a function pointer control within SVUIGrd.ocx of PcVue 10.0. By setting a dword value for the SaveObject() or LoadObject(), an attacker can overwrite a function pointer...
View ArticleReal Networks Netzip Classic 7.5.1 86 Buffer Overflow
This Metasploit module exploits a stack-based buffer overflow vulnerability in version 7.5.1 86 of Real Networks Netzip Classic. In order for the command to be executed, an attacker must convince...
View ArticlephpLDAPadmin
This Metasploit module exploits a vulnerability in the lib/functions.php that allows attackers input parsed directly to the create_function() php function. A patch was issued that uses a whitelist...
View ArticleViscom Image Viewer CP Pro 8.0/Gold 6.0 ActiveX Control
This Metasploit module exploits a stack based buffer overflow in the Active control file ImageViewer2.OCX by passing a overly long argument to an insecure TifMergeMultiFiles() method. Exploitation...
View ArticleViscom Software Movie Player Pro SDK Activex 6.8 Buffer Overflow
Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute...
View Article