This exploit targets a vulnerability in the Gdiplus.dll library in Windows XP SP2. It allows an attacker to execute arbitrary code or cause a denial of service by tricking the user into opening a specially crafted GIF file.
This is a remote exploit for Apache + mod_mylo. It allows an attacker to execute shellcode on a vulnerable system. The exploit uses a forking portbind shellcode to establish a shell on port 45295. The shellcode is modified from eSDee's original code to fix an issue with the dup2() syscall numbers. This exploit is specific to Linux and FreeBSD targets.
This is a local exploit for the word-list-compress program. It takes advantage of a buffer overflow vulnerability to execute arbitrary code. The exploit overflows the exploit buffer with a shellcode and sets the return address to a specific address in memory. It then loads the exploit string into the environment and executes the word-list-compress program with the exploit as an argument.
This exploit allows remote attackers to execute arbitrary code on a vulnerable Mercury32 mail server. The exploit uses a bind shell payload encoded with XOR.
This exploit targets the phpAbook version 0.8.8b and takes advantage of a local file inclusion vulnerability. By manipulating the 'userInfo' cookie, an attacker can include arbitrary files on the server, potentially accessing sensitive information. The exploit code is provided as a JavaScript snippet that sets the 'userInfo' cookie to include the path to the '/etc/passwd' file.
AyeView v2.20 software does not properly parse values in bmp file header, allowing an attacker to create a special bitmap that can slow down or suspend the entire system. The exploit triggers AyeView to allocate large amounts of memory, causing the system to slow down or crash.
This code snippet contains functions for reading and writing bits to a buffer. It supports up to 32 bits numbers and is not the fastest method. The vulnerability lies in the lack of input validation, which can lead to buffer overflow if the input exceeds the allowed number of bits. The vulnerability can be exploited to execute arbitrary code or crash the program.
This is a remote buffer overflow exploit for Ipswitch WS_FTP. The exploit allows an attacker to gain unauthorized access to the target system.
Plain vanilla stack overflow in the SELECT command