ArGoSoft Ftp Server has a remote overflow vulnerability that allows an attacker to overwrite the eip register and potentially execute arbitrary code. The vulnerability exists in versions 1.4.2.29 and prior. The exploit code demonstrates the vulnerability by overwriting the eip register with a null byte. By manipulating the eip register, an attacker can redirect the program flow to execute malicious code. The exploit code is compiled with Visual C++ 6. The vulnerability was reported to ArGoSoft and a patched version was released.
This script exploits a code injection vulnerability in the 'downloads.php' module of phpBB version <= 2.0.13. By manipulating the 'user_id' parameter, an attacker can execute arbitrary SQL queries and retrieve sensitive information, such as the MD5 hash of the user's password.
Blind SQL Injection vulnerability in /index.php allows an attacker to manipulate the SQL query by injecting malicious input in the 'enter_login' and 'enter_parol' cookies. The vulnerability can be exploited to bypass authentication and gain unauthorized access to the system.
The exploit is for AudioPLUS version 2.00.215 and it targets a buffer overflow vulnerability in the .m3u and .lst file formats. The exploit uses a specific sequence of characters to overflow the buffer, overwrite the structured exception handler (SEH) with a specific address, and execute shellcode. It has been tested on Windows XP Pro SP2 (EN).
This exploit is a reverse shellcode that allows an attacker to gain remote access to a vulnerable system. It is a modified version of vlad902's reverse shellcode from metasploit.com, created by class101 for ca's xpl0.
This exploit demonstrates a buffer overflow vulnerability in the main function of the program. The vulnerable code does not properly handle user input, allowing an attacker to overwrite the buffer and potentially execute arbitrary code.
This exploit targets the linux kernel versions up to 2.6.10 (2.6.x) and causes a denial of service (DOS) by creating multiple files and locking them. It is written by ChoiX and belongs to the uKt Research team. The exploit starts by creating files with specific names and then locks them. It continues to create files until the system crashes.
The HT-MP3Player 1.0 (.ht3) application is vulnerable to a universal buffer overflow, specifically a stack-based buffer overflow. This vulnerability can be exploited to execute arbitrary code by crafting a malicious .ht3 file and triggering the overflow. The exploit takes advantage of a SEH (Structured Exception Handler) overwrite to gain control of program execution flow. The payload used in the exploit is a shellcode that executes the 'calc' program. This exploit has been tested on Windows XP Pro SP3 (EN).
This exploit takes advantage of a remote buffer overflow vulnerability in Bopup Communications Server version 3.2.26.5460. It allows an attacker to execute arbitrary code on the target system.
This exploit allows remote attackers to execute arbitrary code on vulnerable versions of Cyrus imapd (2.2.4 - 2.2.8) using the imapmagicplus module.