The Piolet client version 1.05 is vulnerable to a remote denial of service attack. By flooding the remote client with a large number of requests, it can be crashed. This proof of concept code demonstrates the vulnerability.
This is a buffer overflow exploit for VUPlayer version 2.49 and below. It allows an attacker to execute arbitrary code by exploiting a vulnerability in the handling of .cue files. The exploit is written in Perl and contains a shellcode payload.
This exploit demonstrates a local stack buffer overflow vulnerability in ezip wizard. By creating a specially crafted file, an attacker can overwrite the SEH (Structured Exception Handling) chain, potentially allowing for arbitrary code execution. This vulnerability has been found in other software as well, such as ZipGenius and Power zip 7.2.
The exploit allows an attacker to execute arbitrary commands on a vulnerable vBulletin forum. The vulnerability exists in the forumdisplay.php file, where the 'GLOBALS' parameter is not properly sanitized, allowing an attacker to inject malicious code and execute commands on the underlying system. The exploit takes advantage of several conditions that must be met in order for the exploit to work. These conditions include the 'showforumusers' option being enabled, the user being a guest/visitor, at least one user being shown in the forum, and magic_quotes_gpc being turned off. The exploit also requires bypassing the unset($GLOBALS["$_arrykey"]) code in init.php using the secret array GLOBALS[]=1.
This exploit is for MediaCoder version 0.6.2.4275. It is a universal buffer overflow exploit that overwrites the Structured Exception Handler (SEH). The exploit is written in Ruby and requires the user to enter a name for their file. The exploit code is not provided in the text.
This is a universal seh overwrite exploit for Nokia Multimedia Player 1.0 (playlist). It exploits a buffer overflow vulnerability to overwrite the seh (structured exception handler) and gain control of the program execution flow. The exploit includes a shellcode that executes the calc command.
The AWStats CGI script allows attackers to execute arbitrary Perl code by making a specially crafted HTTP request. This can lead to unauthorized access to sensitive information or the execution of malicious commands on the server.
This is a local privilege escalation exploit for the a2ps program. It takes advantage of a vulnerability in the program to execute arbitrary code with root privileges. The exploit uses a shellcode to spawn a shell as root.
This exploit targets a buffer overflow vulnerability in WinAmp version 5.541. The exploit is universal and reliable, exploiting both a standard buffer overflow and a SEH overflow. It can also run any shellcode, making it versatile. The instructions for running the exploit are provided in the script.
This exploit targets a buffer overflow vulnerability in EFS Easy Chat Server. By sending a specially crafted authentication request, an attacker can cause a buffer overflow and potentially execute arbitrary code on the target system. The exploit uses a SEH (Structured Exception Handling) overwrite technique to gain control of the program flow. Tested on Windows XP Pro SP2-3.