This exploit allows remote attackers to execute arbitrary code via a long GET request to the webtool component. The vulnerability is caused due to a boundary error within the webtool when handling requests with overly long URIs. This can be exploited to cause a stack-based buffer overflow via a specially crafted GET request.
This exploit targets the PMsoftware Web Server version 1.0 and takes advantage of a remote stack overflow vulnerability. By sending a specially crafted HTTP request, an attacker can trigger a stack overflow and execute arbitrary code on the target system. The exploit includes a payload shellcode that opens a reverse shell on port 4444.
This exploit targets the FTPShell Client version 4.1 RC2 on Windows XP SP3. It exploits a stack overflow vulnerability in the 'Name Session' feature of the program. The exploit code contains a shellcode for executing the 'calc.exe' program. The exploit is coded by 'zec' and can be contacted at zec@bsdmail.com.
This exploit targets the jetAudio software version 7.1.9.4030 plus vx. It utilizes a RET - Universal method to trigger a local stack overflow vulnerability. The exploit has been tested on Windows XP SP3 En. The exploit was written by corelanc0d3r and can be found at http://www.milw0rm.com/exploits/9359. The payload is prepared by creating a malicious .m3u file named 'c0d3rsploit.m3u'. The exploit includes a shellcode that executes a calc command.
This code demonstrates a stack overflow vulnerability in Gaim 1.2.1 when processing email addresses. It causes a segfault when executing the /vuln command in a conversation. If a protocol allows a 10002-character message to go through, it also segfaults the recipient. The vulnerability is due to the stack being overwritten with 'A's and the return address of the function being set to 0x41414141.
This module exploits a stack overflow in the NetWare CIFS.NLM driver. Since the driver runs in the kernel space, a failed exploit attempt can cause the OS to reboot.
This module exploits a stack overflow in VUPlayer <= 2.49. When the application is used to open a specially crafted cue file, a buffer is overwritten allowing for the execution of arbitrary code.
This vulnerability allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TCP/IP packet.
This exploit is for Winamp version 5.5.8.2985 with the in_mod plugin. It exploits a stack overflow vulnerability in the software. The exploit allows an attacker to execute arbitrary code on a Windows XP SP3 system that is fully patched but does not have ASLR or DEP bypass. The bug was found by a user on the website exploit-db.com and the proof of concept (POC) was created by fdisk. The exploit itself was developed by Mighty-D. The exploit is able to bypass certain security measures and gain control of the system.
The DATAC RealWin SCADA server package for medium/small applications is vulnerable to two stack overflow vulnerabilities. The first vulnerability occurs in the SCPC_INITIALIZE and SCPC_INITIALIZE_RF functions, where a stack-based buffer overflow is caused by the usage of sprintf(). The second vulnerability occurs in the SCPC_TXTEVENT function, where a stack-based overflow is caused by the usage of strcpy() with data supplied by the attacker.