This exploit allows an attacker to execute arbitrary code or crash the ProShow Producer and ProShow Gold versions 4.0.2549 by creating a specially crafted .psh file. The vulnerability is caused by a buffer overflow in the parsing of the file header.
The validation of some ftp commands are not made by the server. This leads to a DoS.
Bug is present in <= 2.6.31-rc7, but the impact is limited to <= 2.6.24.4 as AF_LLC sockets have been restricted to CAP_NET_RAW since then. Only 5 bytes of uninitialized kernel stack are leaked via AF_LLC's getsockname().
This exploit is for Media Jukebox 8 (.M3U) which is a universal local buffer overflow vulnerability. It exploits a SEH (Structured Exception Handling) vulnerability in the program. The exploit uses a combination of NOP sled and shellcode to gain control of the program's execution flow.
This exploit code demonstrates a local exploitable buffer overflow vulnerability in BitchX. The vulnerability allows a malicious local user to obtain root access by exploiting the buffer overflow condition. The code verifies the bug on the system.
This exploit demonstrates a buffer overflow vulnerability in an unnamed function. It allows an attacker to overwrite memory beyond the bounds of the buffer, potentially leading to code execution or a crash. The exploit includes three different buffer overflow payloads of varying lengths.
The File System Filter driver in avast! 4.8.1335 Professionnel is prone to a local kernel buffer overflow vulnerability. This allows an intruder to gain SYSTEM privileges on a Windows system from a limited user account.
This exploit targets the PMsoftware Web Server version 1.0 and takes advantage of a remote stack overflow vulnerability. By sending a specially crafted HTTP request, an attacker can trigger a stack overflow and execute arbitrary code on the target system. The exploit includes a payload shellcode that opens a reverse shell on port 4444.
This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in ProShow Gold 4.0. The vulnerability is triggered when processing a specially crafted show file.
This exploit demonstrates a buffer overflow vulnerability in the GDivX Zenith Player AviFixer Class in Internet Explorer 6. It sets the EIP register to 'BBBB' and creates a buffer overflow by providing a long string of 'A's followed by the EIP value and additional padding. This exploit was tested on Windows XP SP2.