This vulnerability exists in Microsoft Excel 2002 SP3. It allows an attacker to corrupt the heap memory by parsing a specially crafted WOPT record. This can lead to remote code execution or a denial of service.
This is an exploit for the MS05-036 vulnerability, which is a stack overflow vulnerability. The exploit was tested on Windows XP SP1 RUS with explorer.exe. The exploit is in the form of a JPEG file with a crafted ICC profile.
This exploit allows an attacker to execute arbitrary code by exploiting a stack overflow vulnerability in the Java CMM component. The vulnerability exists in Java runtime versions prior to 6.19. By sending a specially crafted request, an attacker can trigger the stack overflow and gain control of the affected system.
This exploit is a SEH Overflow exploit for Audiotran version 1.4.2.4. It allows for DEP bypass. The exploit payload is a Windows/exec payload with a size of 144 bytes. The payload uses the x86/shikata_ga_nai encoder and sets the EXITFUNC to seh and CMD to calc.
This exploit takes advantage of a vulnerability in the Maian Gallery v2 software, allowing an attacker to download files from the target server. The vulnerability is related to the use of the file_get_contents() function, which has some limitations such as being unable to execute PHP code or read certain file types. The exploit has been tested on Ubuntu Linux 2.6.32 with PHP v5.3.2 and the register_globals setting turned off. The vulnerability was discovered by a PHP expert and has since been patched. This PoC (Proof of Concept) code is provided for educational purposes.
This vulnerability allows remote attackers to execute arbitrary code on the target system.
This exploit takes advantage of a SEH (Structured Exception Handler) overflow vulnerability in A-PDF All to MP3 Converter v.1.1.0. By sending a specially crafted WAV file as input, an attacker can trigger the overflow and execute arbitrary code. The exploit has been tested on Windows XP SP3.
phpmyfamily is a dynamic genealogy website builder which allows geographically dispersed family members to maintain a central database of research which is readily accessable and editable. By having a central repository, family members can contribute as and when information becomes available without requiring them to send it to a central 'custodian', or disseminate via email, and allows anecdotal information and possible leads to be shared. The vulnerabilities include directory listing and cookie info disclosure, as well as cross-site scripting (XSS) vulnerabilities.
This exploit allows remote attackers to execute arbitrary code on a system with Firefox 3.6.4 by exploiting a vulnerability in the Firefox plugin parameter EnsureCachedAttrParamArrays.
This exploit generates a malicious .ilj project file for Honestech VHS to DVD <= 3.0.30 Deluxe. When the corrupt file is loaded in Advanced mode, it triggers a buffer overflow. The exploit is for education purposes only.