This module exploits a stack buffer overflow in SHTTPD <= 1.34. The vulnerability is caused due to a boundary error within the handling of POST requests.
This module exploits a simple stack buffer overflow in the Sentinel License Manager. The SentinelLM service is installed with a wide selection of products and seems particular popular with academic products. If the wrong target value is selected, the service will crash and not restart.
This module exploits a buffer overflow in FTPGetter Standard v3.55.0.05 ftp client. When processing the response on a PWD command, a stack based buffer overflow occurs. This leads to arbitrary code execution when a structured exception handler gets overwritten.
This module exploits a stack buffer overflow in McAfee Remediation Agent 4.5.0.41. When sending an overly long string to the DeleteSnapshot() method of enginecom.dll (3.7.0.9) an attacker may be able to execute arbitrary code. This control is not marked safe for scripting, so choose your attack vector accordingly.
This module exploits a stack buffer overflow in the svchost service, when the netware client service is running. This specific vulnerability is in the nwapi32.dll module.
This exploit targets the SnackAmp 3.1.3B software and utilizes a buffer overflow vulnerability to execute arbitrary code. It bypasses both SEH and DEP protections. The exploit payload is a shellcode that opens the calculator application on the target system.
This is a local buffer overflow exploit for PhotoFiltre Studio X .tif files. It allows an attacker to overwrite the seh handler with a pop pop ret instruction and overwrite the next seh with a jmp ebp instruction. The exploit then finds the exact location ebp points to and writes a jmp 0x40 bytes instruction. This exploit does not have space for shellcode, so a jmp ebp option is chosen instead of an egghunter. The exploit is designed for MS Windows xp pro sp3.
This exploit takes advantage of a stack overflow vulnerability in the Rising Online Virus Scanner ActiveX Control. By passing a large string as an argument to the 'Scan()' function, it causes the control to crash, resulting in a denial of service condition.
This is a proof of concept (PoC) exploit for a remote stack overflow vulnerability in Crob FTP Server 3.6.1 on Windows XP. The exploit is designed to execute arbitrary code on the vulnerable server.
Multiple buffer overflow vulnerabilities exist in the environment variable handling of LBreakout2. The issue is due to an insufficient boundary checking of certain environment variables used by the affected application. A malicious user may exploit this condition to potentially corrupt sensitive process memory in the affected process and ultimately execute arbitrary code with the privileges of the game process.