This exploit demonstrates a command injection vulnerability in the KLoader binary that ships with Proxifier <= 2.18. The vulnerability allows an attacker to execute arbitrary commands as root.
This exploit targets the nvUnifiedControl.AUnifiedControl.1 control in NVR SP2 2.0, specifically the SetText() function. By exploiting a heap spray technique, an attacker can trigger a remote buffer overflow vulnerability in the nvUnifiedControl.dll version 1.1.45.0. This vulnerability allows the attacker to execute arbitrary code on the target system.
The vulnerability allows an attacker to inject sql commands....
This exploit takes advantage of a stack overflow in p_mode in BitchX-1.1 Final. Due to input size restrictions, the overflow can't occur on the stack, but it can overwrite a structure containing pointers to heap data, allowing the attacker to overwrite the GOT.
This exploit takes advantage of a buffer overflow vulnerability in VX Search Enterprise v10.2.14. The vulnerability allows an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code. The exploit requires enabling the web server and having login credentials for the VX Search webpage.
The exploit allows for a local buffer overflow in the "Input Directory" field of Dup Scout Enterprise v10.0.18. It takes advantage of a SEH (Structured Exception Handler) Unicode vulnerability.
The vulnerability allows an attacker to include remote files in the application, potentially allowing them to execute arbitrary code.
This exploit targets the courier-imap version 3.0.2-r1 and leverages a remote format string vulnerability to execute arbitrary code. The exploit is launched against the IP address 127.0.0.1 on port 143. The exploit retrieves the current ebp value, possible saved ebp values, and possible write on the stack pointer. It then verifies the obtained values and proceeds to build the necessary components for the exploit, including the format string and shellcode. The exploit uses a ret value of 0x8057000 and the got address of fprintf() at 0x804fefc. After successfully executing the exploit, it gains root access and prints the UID, GID, and group information.
This program overwrites the system's huge zero page.
This exploit provokes a DoS in the Thomson 2030 firmware v1.52.1 device by sending a specially crafted SIP request.