header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

ezip wizard Local Stack Buffer Overflow (SEH) POC

This exploit demonstrates a local stack buffer overflow vulnerability in ezip wizard. By creating a specially crafted file, an attacker can overwrite the SEH (Structured Exception Handling) chain, potentially allowing for arbitrary code execution. This vulnerability has been found in other software as well, such as ZipGenius and Power zip 7.2.

vBulletin Forumdisplay.php Remote Command Execution

The exploit allows an attacker to execute arbitrary commands on a vulnerable vBulletin forum. The vulnerability exists in the forumdisplay.php file, where the 'GLOBALS' parameter is not properly sanitized, allowing an attacker to inject malicious code and execute commands on the underlying system. The exploit takes advantage of several conditions that must be met in order for the exploit to work. These conditions include the 'showforumusers' option being enabled, the user being a guest/visitor, at least one user being shown in the forum, and magic_quotes_gpc being turned off. The exploit also requires bypassing the unset($GLOBALS["$_arrykey"]) code in init.php using the secret array GLOBALS[]=1.

MediaCoder 0.6.2.4275 Universal Buffer Overflow Exploit (SEH)

This exploit is for MediaCoder version 0.6.2.4275. It is a universal buffer overflow exploit that overwrites the Structured Exception Handler (SEH). The exploit is written in Ruby and requires the user to enter a name for their file. The exploit code is not provided in the text.

Nokia Multimedia Player 1.0 (playlist) Universal Seh Overwrite Exploit

This is a universal seh overwrite exploit for Nokia Multimedia Player 1.0 (playlist). It exploits a buffer overflow vulnerability to overwrite the seh (structured exception handler) and gain control of the program execution flow. The exploit includes a shellcode that executes the calc command.

WinAmp <= 5.541 Skin Universal Buffer Overflow Exploit

This exploit targets a buffer overflow vulnerability in WinAmp version 5.541. The exploit is universal and reliable, exploiting both a standard buffer overflow and a SEH overflow. It can also run any shellcode, making it versatile. The instructions for running the exploit are provided in the script.

EFS Easy Chat Server Authentication Request Buffer Overflow (SEH)

This exploit targets a buffer overflow vulnerability in EFS Easy Chat Server. By sending a specially crafted authentication request, an attacker can cause a buffer overflow and potentially execute arbitrary code on the target system. The exploit uses a SEH (Structured Exception Handling) overwrite technique to gain control of the program flow. Tested on Windows XP Pro SP2-3.

Recent Exploits: