This exploit targets Chasys Media Player 1.1 by exploiting a stack overflow vulnerability in the .cue file parser. The attacker can craft a specially crafted .cue file that, when opened by the vulnerable media player, will trigger the stack overflow and potentially allow the execution of arbitrary code. This exploit has been written in Ruby and can be used to gain unauthorized access to a target system.
This exploit is for Chasys Media Player version 1.1. It takes advantage of a stack overflow vulnerability in the program's handling of .pls files. By creating a specially crafted .pls file, an attacker can execute arbitrary code on the target system. The exploit includes a shellcode payload that launches a bind shell on port 666.
This exploit targets VUPlayer version 2.49 and utilizes a stack overflow vulnerability in the handling of .asx files. By crafting a malicious .asx file, an attacker can trigger a stack overflow, potentially allowing for the execution of arbitrary code.
This exploit demonstrates a local stack overflow vulnerability in VUPlayer version 2.49. The vulnerability can be triggered by opening a specially crafted .asx file. The exploit code provided causes a stack overflow by sending a long string of A characters. This can lead to remote code execution or a denial of service condition.
This exploit targets GOM Player version 2.0.12 and utilizes a stack overflow vulnerability in the ASX file format. The exploit code is provided by DATA_SNIPER and can be used to execute arbitrary code. The vulnerability was initially reported by Parvez Anwar in Secuina. The exploit is Universal as it uses an internal address (in GOM.exe) to JMP and run the shellcode. SEH Method can be implemented for a variant exploit.
The IntelliTamper software version 2.07/2.08 is vulnerable to a local stack overflow. The vulnerability allows an attacker to execute arbitrary code by exploiting a buffer overflow in the ProxyLogin function. By sending a specially crafted request, an attacker can overflow the buffer and overwrite the return address on the stack, allowing them to execute arbitrary code.
A local exploit for the .mx4 project file affecting MixCraft 4.2 (other versions may also work). The exploit implements the SEH technique to exploit the issue and it works on all Windows versions.
This is a proof of concept exploit for a stack overflow vulnerability in Internet Exploiter 3 v0.2. The exploit takes advantage of a vulnerability in the .ANI file format to overwrite the stack and potentially execute arbitrary code. The exploit works by placing a specially crafted .ANI file in the BODY of an HTML document. The vulnerability was discovered by Yuji Ukai of eEye Digital Security. Microsoft has released a patch for this vulnerability, which can be found at the provided link.
The cdda library only reserves 20 bytes for names when files are "*.cda". By creating a malicious m3u file with a long name, an attacker can overwrite the stack and execute arbitrary code.
This exploit takes advantage of a stack overflow vulnerability in CCProxy Log. It allows an attacker to execute arbitrary code by sending a specially crafted HTTP request. The exploit includes a shellcode that is injected into the vulnerable process to gain remote access to the system.