This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 version 1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
c36f8e21b4b97cee5ba878b04ceb9d74b2c3487cf9055592c90c45c97711c507
HP Data Protector version 6.11 remote buffer overflow exploit with DEP bypass.
9e8e5a84de486e78b0670c124724bc4754ef8447902faec7f282f582cbf86f0c
KMPlayer version 3.0.0.1440 buffer overflow exploit that creates a malicious .mp3 file. It is written for Windows 7 and has ASLR bypass.
1540c6fca8bfe93e9d337d8daa39356863f9fac8e3c72991321f1895865f6e42
KMPlayer version 3.0.0.1440 buffer overflow exploit with DEP bypass that creates a malicious mp3 file.
132a8a91ab46b94954a941964bc52cf820ea67a4c8ae0be94d92b5e07513bded
This Metasploit module exploits a stack buffer overflow in Foxit PDF Reader prior to version 4.2.0.0928. The vulnerability is triggered when opening a malformed PDF file that contains an overly long string in the Title field. This results in overwriting a structured exception handler record. NOTE: This exploit does not use javascript.
b07f351411d99f75f345a772bc24aa52c70ef746199fb1964b1d843455480d94
Foxit Reader version 4.1.1 stack overflow exploit with egghunter shellcode.
9780b51aa733813b396e6fc1a53431ca2e325e1962af0b5c9d51ca76f2250eef
This Metasploit module exploits a buffer overflow in Fat Player 0.6b. When the application is used to import a specially crafted wav file, a buffer overflow occurs allowing arbitrary code execution.
7b207e157e03544e160929ab34671bcd3b540a6779b07f615673383d33fa2fef
This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 v1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
98f77271a20e935a5608bf3a7851354616670e5d252200c33c57d725a70cc30e
This Metasploit module exploits a buffer overflow in WM Downloader v3.1.2.2. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
87a0644ca5d9a7d534b11ef5d0d3292366fd92e4752fed31c5dd3bfb55b114bc
UFO: Alien Invasion version 2.2.1 remote code execution exploit.
c283ab68b69766b9ff26b5845ef311943524c123c5b5c1849acfca98295ccec5
This Metasploit module exploits a stack overflow in the web server provided with the EvoCam program for Mac OS X. We use Dino Dai Zovi's exec-from-heap technique to copy the payload from the non-executable stack segment to heap memory. Vulnerable versions include 3.6.6, 3.6.7, and possibly earlier versions as well. EvoCam version 3.6.8 fixes the vulnerability.
1c923c534030db638a49cbc2059c3e52cb7a34e60ab4c8b6bd58d2cf5b383ff5
This Metasploit module exploits a buffer overflow in FeedDemon v3.1.0.12. When the application is used to import a specially crafted opml file, a buffer overflow occurs allowing arbitrary code execution. All versions are suspected to be vulnerable. This vulnerability was originally reported against version 2.7 in February of 2009.
8afb9bc6b6e5ed13de0b34861110cee4952239ed2ad8726c5bcc1f02b21ecbf8
This Metasploit module exploits a stack buffer overflow in versions v9.7 through v10.5 of IDEAL Administration and versions 4.5 and 4.51 of IDEAL Migration. All versions are suspected to be vulnerable. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code. NOTE: IDEAL Administration 10.5 is compiled with /SafeSEH
d487bf3a03cfdebd126e3b50fa65fc5bba22a39f6bc020af9d9f9429f2ff2e0c
Magneto Software Net Resource Active-X control version 4.0.0.5 NetFileClose universal SEH exploit.
dafefbd5a052860e28f1d8e9700565ab0968b540cdced6a2cbaa906f1feb6536
Magneto Software Net Resource Active-X control version 4.0.0.5 NetConnectionEnum universal SEH exploit.
b9d10fbbbac55c6ecb0fb0eba1ffc33a39c1f7370d0dd65dc9d8ebf8764a0ca6
MagnetoSoft NetworkResources Active-X control version 4.0.0.5 universal NetShareEnum exploit.
e5e9dd457a5d47a4167714edcf50f29f18d400bc390885e0b371d105f6e66821
This Metasploit module exploits a stack-based buffer overflow in VariCAD 2010-2.05 EN. An attacker must send the file to victim and the victim must open the file.
606044200780a7d9d63b6fcf47963bd052e8a437c8822a35a6d9f1cb62286b98
This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.
fe48caf317027e30bd5da8dd119e9fa08b7127b8f16f258298a6f1979a6d973f
This Metasploit module exploits a stack-based buffer overflow in Audiotran 1.4.1. An attacker must send the file to victim and the victim must open the file. Alternatively it may be possible to execute code remotely via an embedded PLS file within a browser, when the PLS extention is registered to Audiotran. This functionality has not been tested in this module.
339082146c5bb1630c37aae3bf1b184da498e5a3a69f394d4eac5e7a0c043bce
This exploits a stack overflow in NetTransport Download Manager, part of the NetXfer suite. This Metasploit module was tested successfully against version 2.90.510.
bf6500a66ae079ee9bf77addffc2d579c17c8d0c7c04d2cb70fdae113cbc6cd9
This Metasploit module exploits a buffer overflow in the Eureka Email 2.2q client that is triggered through an excessively long ERR message. NOTE: this exploit isn't very reliable. Unfortunately reaching the vulnerable code can only be done when manually checking mail (Ctrl-M). Checking at startup will not reach the code targeted here.
03aa5d1fb353fd0b0a186d111853941e220644c617f4997fc853286c33067088
This Metasploit module exploits a stack overflow in the NCTAudioFile2.Audio ActiveX Control provided by various audio applications. By sending a overly long string to the "SetFormatLikeSample()" method, an attacker may be able to execute arbitrary code.
572cd45f169e8ae99680a260fbe93c3ec15696fd145b671b14f7ce7d7656216b
Adobe Illustrator CS4 (V14.0.0) Encapsulated Postscript (.eps) overlong DSC Comment Buffer Overflow Exploit
fa7d623818aa870797cedbdfe793f36edde2119163f962043b50da8da39732e1
This Metasploit module exploits a stack overflow in IDEAL Administration v9.7. By creating a specially crafted ipj file, an attacker may be able to execute arbitrary code.
671e32b58eafc179c66a2c75065bd9266308aadcc36d69ae7c4a2f035130544f
This Metasploit module exploits a buffer overflow in Audio Workstation 6.4.2.4.3. When opening a malicious pls file with the Audio Workstation, a remote attacker could overflow a buffer and execute arbitrary code.
d9f34d3ca724495af9e1703e2053bf024bceb6935e3dacafc2b68f298b46fb9a