This exploit takes advantage of a stack buffer overflow vulnerability in Kingsoft Writer 2010. By sending a specially crafted .C file, an attacker can trigger a stack buffer overflow, potentially leading to remote code execution.
This exploit takes advantage of a stack/SEH overflow vulnerability in WinProxy 6.0 R1c. It allows an attacker to execute arbitrary code on the target system.
This exploit takes advantage of a SQL injection vulnerability in the image_display_details1.php script of the 2daybiz Photo Sharing Script. It allows an attacker to execute arbitrary SQL queries and potentially gain unauthorized access to the database.
The vulnerability allows attackers to inject SQL queries into the 'cate' parameter of the searchproject.php script, leading to potential unauthorized access and manipulation of the database.
The vulnerability exists in the searchvote.php script of the 2daybiz Polls Script. An attacker can exploit this vulnerability by injecting malicious SQL queries through the 'category' parameter. This can lead to unauthorized access, data manipulation, or data leakage.
The exploit is a stack buffer overflow in UltraISO software. It affects versions 9.3.6.2750 and can be exploited remotely as well as locally. The bug allows an attacker to overwrite the stack buffer, potentially leading to arbitrary code execution. The exploit is specific to Windows operating systems including Windows 7/2008/Vista/2003/XP (32-bit and 64-bit), Windows 2000, ME, 98SE, 98, or Windows NT4.0 SP6a. There is no known fix for this vulnerability. The exploit code is written in C and requires the gcc compiler version 3.4.4 (cygming special, gdc 0.12, using dmd 0.125). It is recommended to use the cygwin console to avoid any problems under Windows.
This exploit targets a buffer overflow vulnerability in Winamp version 5.572 on Windows 7 Ultimate x64 ENG. It bypasses ASLR and DEP protections. The exploit involves replacing the 'whatsnew.txt' file in the Winamp folder and then right-clicking on the flash symbol and selecting 'Nullsoft Winamp...' and then 'Version history'. The exploit uses a ROP chain to control program execution.
This exploit is designed to work with PHP versions 4.3.10 and 4.4.0 under Windows XP SP 1. It overwrites the EIP (Extended Instruction Pointer) with a CALL ESI from ws2_32.dll from Windows XP SP1. The shellcode is written into the $user variable and a temporary memory location is trashed. This exploit is specifically for Apache/1.3.33 and PHP/4.4.0 on Windows only.
This is a local buffer overflow exploit for WinRAR version 3.3.0 and below. The exploit uses a jmp esp instruction in various DLLs to gain control of the program flow. The exploit also includes Metasploit shellcode to establish a reverse shell on port 4444.