This exploit code demonstrates a local exploitable buffer overflow vulnerability in BitchX. The vulnerability allows a malicious local user to obtain root access by exploiting the buffer overflow condition. The code verifies the bug on the system.
This exploit demonstrates a buffer overflow vulnerability in an unnamed function. It allows an attacker to overwrite memory beyond the bounds of the buffer, potentially leading to code execution or a crash. The exploit includes three different buffer overflow payloads of varying lengths.
The File System Filter driver in avast! 4.8.1335 Professionnel is prone to a local kernel buffer overflow vulnerability. This allows an intruder to gain SYSTEM privileges on a Windows system from a limited user account.
This exploit targets the PMsoftware Web Server version 1.0 and takes advantage of a remote stack overflow vulnerability. By sending a specially crafted HTTP request, an attacker can trigger a stack overflow and execute arbitrary code on the target system. The exploit includes a payload shellcode that opens a reverse shell on port 4444.
This exploit allows an attacker to execute arbitrary code by exploiting a buffer overflow vulnerability in ProShow Gold 4.0. The vulnerability is triggered when processing a specially crafted show file.
This exploit demonstrates a buffer overflow vulnerability in the GDivX Zenith Player AviFixer Class in Internet Explorer 6. It sets the EIP register to 'BBBB' and creates a buffer overflow by providing a long string of 'A's followed by the EIP value and additional padding. This exploit was tested on Windows XP SP2.
Sending between 40-1000 requests to nonexisting pages on the HTTP server (httpsv1.6.2) will cause the process to crash.
This is an exploit for the Traidnt UP v2.0 script that allows for SQL injection. The exploit was discovered and written by Jafer Al-Zidjali. The vulnerability occurs when the magic_quotes_gpc setting is turned off. The author has been notified and a public patch has been released for this vulnerability.
This exploit takes advantage of a heap overflow vulnerability in Microsoft Exchange, specifically in the X-LINK2STATE chunk. It allows an attacker to execute arbitrary code on a vulnerable system.
Exploit allows remote code execution through a buffer overflow vulnerability in the Playlistmaker application. The exploit takes advantage of a vulnerable SEH chain to gain control of the program.